Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Data transmission ciphering and integrity checking method

A technology for integrity verification and data transmission, which is applied in transmission systems, electrical components, wireless communications, etc., can solve the problems of destroying shared serial number attacks, inability to resist, and inability to stop, so as to solve data tampering behavior and improve security , performance-enhancing effects

Active Publication Date: 2012-07-04
观源(上海)科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, simply relying on message authentication codes to detect the integrity of each transmitted data has the disadvantage of being unable to resist attacks such as replay, so it does not have sufficient security
[0004] Through document retrieval to prior art, it is found that: W.Shi et al. are in "Proceedings of the International Conference on Parallel Architectures and Compilation Techniques, 2004, pp.123-134" (Proceedings of the International Conference on Parallel Architecture and Compilation Techniques, 2004, "Architectural Support for High SpeedProtection of Memory Integrity and Confidentiality in MultiprocessorSystems" published on page 123-page 134) (architecture supports multiprocessor system memory integrity and high-speed protection of confidentiality), which proposes inter-processor The confidentiality and integrity protection technology of data communication, specifically, the bus serial number that can be shared and monitored by the processors is used to generate the encryption key, and combined with the message authentication code of each transmitted data, the encryption and verification of the bus data is realized. experience; its shortcoming is: not all communication nodes in all cases can share the same serial number among each other (for example, multi-processor interconnection structure in non-bus form), so this technology cannot be generally applied. In addition, this Technology cannot prevent attacks by breaking the synchronization of shared serial numbers across processors

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data transmission ciphering and integrity checking method
  • Data transmission ciphering and integrity checking method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. This embodiment is carried out on the premise of the technical solution of the present invention, and the detailed implementation and specific operation process are given; but the protection scope of the present invention is not limited to the following embodiments.

[0013] Such as figure 1 As shown, data 500 is currently being transmitted from source node 100 to destination node 200 . In order to encrypt the transmitted data 500 and implement integrity verification, the source node performs the following process:

[0014] Generate message authentication code 501 for data 500;

[0015] Encrypt data 500 to obtain ciphertext data 502;

[0016] The result sent to the transmission path is ciphertext data 502 and message authentication code 503;

[0017] If the message authentication code is not encrypted, the sent message authentication code 503 is the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an encryption and integrality check method of a data-transmission belonging to the electric communication technique field. In the invention, an originating node and a destination node share a root key not known by attackers, the root key and message authentication codes of all the prior transferred data generate an encryption key for encrypting the prior transferred data;at the present an encrypted data and a message authentication code corresponding the data node are transferred from the originating node to the destination node. The invention can encrypt and check the data transferred between the nodes and have advantages of safety and high performance.

Description

technical field [0001] The present invention relates to a data transmission method in the technical field of telecommunications, in particular to an encryption and integrity check method for data transmission. Background technique [0002] To protect information, data in transit needs to be encrypted and integrity checked. Encryption is to protect the confidentiality of data, so that attackers cannot understand the original meaning of the data intercepted on the transmission path; integrity verification is to prevent attackers from maliciously modifying the transmitted data, injecting forged data, replaying Tampering with data transmitted in the past, blocking currently transmitted data, reversing the order of data transmission, etc. This protection requirement for data transmission exists in many fields; for example, data is transmitted from a certain processor inside the same computer to another processor; another example is that data is transmitted from one computer syst...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W12/02H04W12/10H04W12/106
Inventor 侯方勇谷大武张媛媛张俊钦曾梦岐
Owner 观源(上海)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products