Virtual Private Network is a virtual network that builts on the public Internet, the virtual channel is realized by tunnel technology. With the rapid development of Internet, more and more enterprises, organizations and institutions have made use of network to connect the branch around the world to provide remote access service for their own employees (Commuter, Business trip).Because of the advantage of price and security in building Virtual Private Network, many companies and enterprises have taken this technology to build Virtual Private Network for safety data transmission. Based on the characteristic of quantum mechanics, quantum communication has strictly sense of security. Based on the characteristic of quantum mechanic, this paper puts forward a method to integrate quantum cryptography technology and VPN technology application, which will greatly improve the security of network.This paper focuses on VPN network structure and characteristics of VPN network security. There are four factors which impact the security of VPN secure communication. Based on the special characteristic for quantum cryptograyphy communication, we take key management technology and user authentication technology for expansion.For key management, we put forward a VPN key management model and method including strategy controller layer, routing controller layer, resource controller layer and key generator layer based on the quantum key, and then introduce how to carry on a secure distribution of the key. The transmitter sends Connection request at first, and then begins to negotiate security strategies, then the strategy controller layer would control and complete the relevant channel establishment, choose a different key combination, and rotate different strategies when line fault cases occure. At last, we also give a safety analysis.For user authentication, this paper puts forward a kind of user authentication technology based on the quantum key. This technology contains three stages:Initial stage, Authentication stage and Subsequent validation stages. In the Initial stage, the transmitter generates preliminary sharing key with the help of TC (trusted center). In the authentication stage, both sides verify identity based on quantum communication mode for each other. After the Identity authentication, both sides can be safe to perform the classic quantum key distribution. In the following verification stage, both sides will take the user authentication periodically. At last, we give the detailed safety analysis, and demonstrate the unconditional security of this technology. |