Router with hardware encryption and decryption function and encryption and decryption method of router

An encryption method and router technology, applied in the field of network security, can solve problems such as slow software implementation speed, taking up more host resources, and program running is easy to be tracked

Active Publication Date: 2016-02-24
台州市吉吉知识产权运营有限公司
View PDF5 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although general routers contain embedded micro-processing units, their computing power is extremely low and cannot meet the requirements for high-speed encryption and decryption of data streams.
[0004] In addition, at present, the more commonly used encryption method is software. Although it can satisfy personal use, if it is used in government departments and financial institutions with high security and large data volumes, the shortcomings of software encryption will be exposed, including : Software encryption takes up more host resources, software implementation is slow, program operation is easy to be tracked, keys and passwords are not easy to manage, virus software, especially Trojan horse programs and backdoor programs pose threats, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Router with hardware encryption and decryption function and encryption and decryption method of router
  • Router with hardware encryption and decryption function and encryption and decryption method of router
  • Router with hardware encryption and decryption function and encryption and decryption method of router

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0109] Such as figure 1 Shown is a schematic structural diagram of the first embodiment of the router 100 with hardware encryption and decryption functions provided by the present invention. It can be seen from the figure that the router 100 includes interconnected routing function modules 110 and FPGA-based hardware Encryption and decryption module 120. In the course of work, first, the routing function module 110 receives from the outside the plaintext that needs to be encrypted or receives the ciphertext that needs to be decrypted; then, the routing function module 110 sends the received plaintext or ciphertext to the hardware encryption and decryption module 120; When the hardware encryption and decryption module 120 receives the plaintext or ciphertext sent by the routing function module 110, it is encrypted or decrypted immediately, and the encrypted data or decrypted data produced are sent to the routing function module 110; finally, the routing function module 110 sen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a router with a hardware encryption and decryption function and an encryption and decryption method of the router. The router includes a routing function module and a field programming gate array-based hardware encryption and decryption module, wherein the routing function module and the field programming gate array-based hardware encryption and decryption module are connected with each other; the hardware encryption and decryption module encrypts plaintexts received by the routing function module from the outside or decrypts ciphertexts received by the routing function module from the outside; and the routing function module transmits out encrypted data generated by the encryption of the hardware encryption and decryption module or decrypted data generated by the decryption of the hardware encryption and decryption module through a wireless channel. In a work process, the routing function module of the router is not utilized to encrypt or decrypt the received plaintexts or ciphertexts, but the hardware encryption and decryption module is utilized to realize encryption and decryption, and therefore, the router can perform high-speed safe hardware encryption on the received plaintexts or ciphertexts, and at the same time, high-speed and effective forwarding of the encrypted data and the decrypted data of the router can be ensured.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a router and a method for encrypting / decrypting data by the router. Background technique [0002] In terms of network security, a router is an important device to ensure data security, and encryption technology is the core technology and effective means to ensure data security, which can ensure the security of data sent from one router to another. So when sending some important top-secret data, encryption is essential. If it is not encrypted, criminals who can analyze the data stream will easily read the transmitted data or even change the data sent by others, which will easily cause data leakage and bring huge losses to users. Therefore, the use of encryption means to ensure the security of transmitted data has received extensive attention and application. [0003] As a terminal device and Internet interconnection device, the router is located between the untrusted ne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L9/40
Inventor 陈学凯
Owner 台州市吉吉知识产权运营有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products