Method and device for detecting encryption algorithm and secret key

An encryption algorithm and key technology, which is applied in the field of encryption, can solve problems such as the inability to automatically identify the encryption algorithm of the system to be detected, the inability to give an evaluation of the compliance of the encryption algorithm, and the lack of evaluation of the management level of massive keys, so as to prevent encryption Loss or misuse of keys, and the effect of preventing illegal terminals and illegal terminals from accessing

Active Publication Date: 2014-01-15
STATE GRID CORP OF CHINA +4
View PDF3 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this kind of system generally cannot automatically identify the encryption algorithm of the system to be tested, nor can it automatically evaluate the compliance of the encryption algorithm according to the s

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting encryption algorithm and secret key
  • Method and device for detecting encryption algorithm and secret key
  • Method and device for detecting encryption algorithm and secret key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0031] The method and device for detecting the encryption algorithm and the key in the present invention mainly realize the unified detection of the security of the encryption algorithm and the key used by various terminal devices used in the power network, and evaluate whether it has reached According to the specified requirements, terminal devices that violate the regulations are not allowed to access the network.

[0032] figure 1 It is a flowchart of a me...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a device for detecting an encryption algorithm and a secret key. The method comprises the steps of identifying a detected terminal and obtaining the type of the detected terminal and password equipment used by the detected terminal; determining the detected algorithm type according to the password equipment used by the detected terminal; for the detected algorithm type, selecting a set correlation calculation example to carry out calculation, comparing the detected algorithm type with a cipher-text generated after the detected terminal carries out password calculation according to an input plaintext, and generating the detection result of the detected algorithm type; obtaining the length, the strength, the life cycle and the interaction protocol of the secret key used by the detected terminal, carrying out password calculation according to the set technical specification, and generating the detection result of the secret key. The method can automatically identify the algorithm used by terminal equipment, and checks whether the algorithm conforms to the specification of the national password authority, the device is compatible with all types of interfaces, compliance inspection of use of the encryption algorithm and management of the secret key is carried out on the terminal, and terminals breaking the rule and illegal terminals are prevented from being accessed.

Description

technical field [0001] The present invention relates to encryption technology, in particular to a detection method and device for encryption algorithm and key, in particular to a unified encryption algorithm and key detection method and device for business applications of power grid enterprises. Background technique [0002] Encryption technology is the core technology in the field of information security. It can effectively solve the confidentiality, integrity and authenticity of information. In the context of the current highly informatized power business and the continuous popularization of smart grid technology, more and more power equipment is gradually becoming intelligent. The information interaction data in power companies, especially power grid companies, shows a geometric progression. Encryption technology is used to protect them. The key data has become an urgent problem to be solved. [0003] The use of encryption technology has penetrated into all aspects of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/14
Inventor 王刚徐小天陈威陈乐然石磊
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products