Key protection method and safety chip based on physical no-cloning function

A security chip and key protection technology, applied in key distribution to achieve the effect of protecting security and saving costs

Active Publication Date: 2015-10-28
NANJING WANDAO ELECTRONICS TECH CO LTD
View PDF3 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] In order to solve the security problems existing in the existing key protection methods, the present invention provides a key protection method based on the physical unclonable function PUF, so that the leakage of a single key does not affect the security of other keys. The present invention does not directly protect key, but instead protects a seed that derives the key, the seed is deleted immediately after the key is exported

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key protection method and safety chip based on physical no-cloning function
  • Key protection method and safety chip based on physical no-cloning function
  • Key protection method and safety chip based on physical no-cloning function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] combine figure 1 ,Such as figure 2 The security chip shown includes volatile storage, HMAC engine, symmetric encryption engine, public key encryption engine, random number generator, execution engine, non-volatile storage (Non-volatile Memory, NVM), key calculation engine and other components. During the entire life cycle of the security chip, it will go through the key registration stage, the key reconstruction stage, and may also go through the key update stage.

[0065] Volatile storage is used to save temporary data when the security chip is running.

[0066] The HMAC engine is used to calculate the message authentication code, and the key used is generated by the key calculation engine.

[0067] The symmetric cipher engine is used to perform encryption and decryption operations based on symmetric cryptography, and the keys used are generated by the key calculation engine.

[0068] The public key cryptographic engine is used to perform encryption, decryption an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a key protection method based on a physical no-cloning function. The method comprises a key registration phase and a key reconstruction phase. The key registration phase is generally in an equipment manufacturing stage and is used for using the physical no-cloning function on equipment and binding equipment key to the equipment. The key reconstruction phase is in an equipment using stage and is used for calculating the key bound on the equipment in the registration phase. The method also comprises a key updating phase for updating the equipment key. According to the method and the safety chip, a plurality of keys can be safely bound for the equipment, and the safety of other keys is not affected by the leakage of one key. In addition, the invention provides a key updating mechanism, and the equipment key is updated in the condition of not replacing equipment hardware.

Description

technical field [0001] The present invention relates to a key protection method in the field of information security, in particular to a key protection method using a physical unclonable function (Physical Unclonable Function, PUF) in a chip or device to enhance key security and a security key based on a physical unclonable function. chip. Background technique [0002] In modern cryptography, the key is the core of cryptographic functions such as digital signature, identity authentication, encryption and decryption, and secure communication. Once the key is obtained by an attacker, the security of the above cryptographic functions cannot be guaranteed. This shows the importance of keys in information security systems. Moreover, with the rise of businesses closely related to security such as e-commerce and banking, key protection is becoming more and more important in the modern information society. At present, the basic idea of ​​protecting the key is to use a special circ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/0866H04L9/3278H04L63/0428
Inventor 赵世军梁彬张磊
Owner NANJING WANDAO ELECTRONICS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products