Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for updating cryptographic algorithm code, and security processor

A code update, encryption algorithm technology, applied in the usage of multiple keys/algorithms, encryption devices with shift registers/memory, secure communication devices, etc. and other problems to achieve the effect of less memory resources

Active Publication Date: 2015-09-16
VIACCESS SA
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Furthermore, the security processor monitors and cryptanalyzes the received startup message so that the security processor itself cannot find out the update encryption algorithm
[0012] However, the second method requires more memory resources due to the need to initialize records of the different variables of the cryptographic algorithm in the security processor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for updating cryptographic algorithm code, and security processor
  • Method and device for updating cryptographic algorithm code, and security processor
  • Method and device for updating cryptographic algorithm code, and security processor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In the following description, the features and functions known to those skilled in the art will not be described in detail. In addition, the applied known technology is a technology suitable for access systems for scrambling multimedia content. For more information on this technology, please refer to the European Broadcasting Federation Review No. 266 published in Brussels, Belgium, December 21, 1995 No. "Functional Modules of Conditional Access System".

[0038] figure 1 A system 2 for transmitting multimedia content between a transmitter 4 and a large number of receivers is shown. Wherein, these receivers can be connected to the transmitter 4 via the network 6 . For example, the network 6 may be a satellite network connected to the receivers via a wireless connection device.

[0039] To simplify the schema, figure 1 Only the receiver 8 is shown in . It can be assumed that the other receivers are identical to this receiver 8 .

[0040] At the same time, the trans...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This method for renewing the code of an algorithm comprises: receiving (122) a randomly drawn seed whose size in terms of number of bits, is at least four times smaller than the number of bits needed to encode the N numerical constants of the cryptographic algorithm, expanding (128) the seed deterministically to obtain a sequence of numbers whose size, in number of bits, is at least equal to the number of bits needed to encode the N numerical constants of the cryptographic algorithm, generating (132) N new numerical constants from the sequence of numbers obtained, and replacing (134) the N constants of the code of the cryptographic algorithm by the N new constants generated to obtain the code of a renewed cryptographic algorithm.

Description

technical field [0001] The invention relates to a password update module and update method that can be executed by an electronic computer, and also relates to a security processor and an information recording medium for executing the above method. Background technique [0002] Usually, a cryptographic algorithm is used to encrypt a segment of data D with a key K, thereby obtaining a password D * , or pass key K to cipher D * Decryption is performed to obtain segments of data D. When a cryptographic algorithm is executed on an electronic computer, such cryptographic algorithm corresponds to executable or translatable code. Here, the codes to be executed have been compiled in advance, so that the computer can directly execute these codes. And when the code is translated into instructions and executed, the code can be translated. Wherein, codes can be translated into executable instructions by means of a "virtual machine", for example, the JAVA language produced by Sun Micr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/18H04L9/06H04N21/2347H04N7/16H04N7/167
CPCH04N21/26606H04L9/0662H04N21/2383H04L9/12H04N7/1675H04L9/16H04N21/26613H04N7/162
Inventor 派崔克·史奈特
Owner VIACCESS SA
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More