Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key encryption and storage method

A key encryption and key technology, applied in the field of information security, can solve the problems of low key storage complexity and no guarantee of key storage security, and achieve the effect of improving security.

Active Publication Date: 2013-04-17
THE FIRST RES INST OF MIN OF PUBLIC SECURITY +1
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] However, the complexity of key storage in the existing technology is not high, and the security of key storage is not guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key encryption and storage method
  • Key encryption and storage method
  • Key encryption and storage method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] Such as Figure 4 Shown is a key hierarchical structure diagram in the key encryption storage method proposed by the present invention. Depend on Figure 4 It can be seen that the protection master key is generated inside the security module, and its plain text does not appear outside the security module; the hardware random number generator is used to generate a protection key group, which contains multiple protection keys, and is controlled by the protection master The key is encrypted and stored. Protection Master Key The protection key is encrypted with CTR (Counter) mode. A protection key group encrypts multiple working keys in CTR mode. The working key can be generated by random numbers or according to certain operation rules. The working key includes encryption key, MAC key, asymmetric key, etc.

[0060] The block encryption in the CTR mode and the flow of encrypting the protection key and the working key in the present invention will be introduced below.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a key encryption and storage method. The key encryption and storage method comprises the following steps that a protective primary key is generated in a security module, and a plaintext of the protective primary key does not appear outside the security module; a hardware random number generator is utilized to generate a protective key group (containing a plurality of protective keys); the protective keys are encrypted and stored by the protective primary key through a CTR (Click Through Rate) (counter) mode; and a plurality of working keys are encrypted and stored by the protective keys (group) through the CTR mode. The working keys include an encryption key, an MAC (Media Access Control) key, an asymmetrical key and the like and can be generated through random numbers or in accordance with a certain operational rule.

Description

technical field [0001] The invention relates to the field of information security, in particular to a key encryption storage method. Background technique [0002] With the application and development of the network, network security issues have become increasingly prominent. Data encryption is an important mechanism to ensure computer network security. The security of modern information systems protected by cryptography depends on the protection of keys, not the protection of algorithms or hardware itself. Once the key is leaked, lost, or wrong, not only may legitimate users fail to extract information, but it may also cause illegal users to steal information. Therefore, the selection of cryptographic algorithms and protocols, the length of the key, and the confidentiality and security management of the key are extremely important to ensure the security of the system. [0003] The encryption algorithm determines the key management mechanism. Different cryptosystems have d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/28
Inventor 李景华蒋才平陆洪波邓晨亢洋王开林鄢金端
Owner THE FIRST RES INST OF MIN OF PUBLIC SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products