Unlock instant, AI-driven research and patent intelligence for your innovation.

A hardware security evaluation method and device based on rsa algorithm

An RSA algorithm and security technology, applied to secure communication devices, public keys for secure communications, and key distribution, can solve problems such as low accuracy, inability to achieve batch evaluation, and low evaluation efficiency

Active Publication Date: 2018-08-10
SHENZHEN INST OF ADVANCED TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide a hardware security assessment method and device based on the RSA algorithm to solve the problem of low accuracy and low assessment efficiency of the hardware security assessment method based on the RSA algorithm in the current prior art. Unable to realize the problem of batch evaluation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A hardware security evaluation method and device based on rsa algorithm
  • A hardware security evaluation method and device based on rsa algorithm
  • A hardware security evaluation method and device based on rsa algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0037] Such as figure 1 As shown, the embodiment of the present invention provides a hardware security assessment method based on the RSA algorithm, including:

[0038] Step 101 , perform error injection overlapping scanning on hardware based on the RSA algorithm, and generate scanning results.

[0039] Step 102, perform error location on the scanning result according to the automatic vector generation tool, and count the number of error types in the scanning...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security evaluation method and device for hardware based on the RSA algorithm and relates to the technical field of RSA algorithm security. The method comprises the steps of performing error injection overlap scanning on hardware based on the RSA algorithm and generating a scanning result; performing error locating on the scanning result with an automatic vector generation tool and counting the number of the types of errors in the scanning result; obtaining the key length n and a public key e in encryption of the hardware based on the RSA algorithm; judging whether the hardware based on the RSA algorithm meets the security conditions resisting error injection according to the key length n, the public key e and the number of the types of errors in the scanning result. The problems of relatively low accuracy, low evaluation efficiency and incapability of mass evaluation of conventional security evaluation methods for hardware based on the RSA algorithm are solved.

Description

technical field [0001] The invention relates to the technical field of RSA algorithm security, in particular to a hardware security evaluation method and device based on the RSA algorithm. Background technique [0002] At present, as people's requirements for information security gradually increase, the encryption and decryption technology of data information has also been fully developed. The encryption and decryption technology of data information is to transform various original digital information in the Internet through encryption and decryption algorithms under designated users or networks through the encryption mechanism and decryption mechanism in the computer network, and convert them into numbers that are completely different from plaintext. Data information, that is, converted into ciphertext. Encryption and decryption technology is the cornerstone of data information security technology on the Internet. RSA (RSA algorithm, referred to as RSA) algorithm is one o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L9/08
CPCH04L9/0825
Inventor 邵翠萍李慧云徐国卿
Owner SHENZHEN INST OF ADVANCED TECH