A method for securely storing the root key required for encryption and authentication in flash

An encryption authentication and secure storage technology, which is applied in the field of root keys required for FLASH secure storage encryption authentication, and can solve problems such as inability to calculate and process

Active Publication Date: 2019-07-02
XIAMEN YAXON NETWORKS CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For embedded MCU, a large number of calculations may not be able to handle

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for securely storing the root key required for encryption and authentication in flash
  • A method for securely storing the root key required for encryption and authentication in flash

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Such as figure 1 Shown, a kind of method of root key required for encryption authentication in FLASH security storage of the present invention comprises the following steps:

[0019] Step 1. First create a key metadata table. The total length of the key metadata table is 256 bytes. The key metadata table is composed of 256 key metadata key meta, that is, each key metadata key meta The length is one byte, and the value of the key metadata key meta is a hexadecimal number, the value ranges from 0x00 to 0xff, and the value of the key metadata key meta in the key metadata table is unique , that is to say, any two key metadata keymeta values ​​in the key metadata table will not be the same;

[0020] Step 2. In order to further ensure security, the key metadata table is not stored in one piece in the FLASH continuously. The key metadata table is divided into 16 groups, and each group consists of 16 consecutive key metadata key meta For example, key meta0~key meta15 is the f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a method for securely storing a root key required by encryption and authentication in a FLASH. The method comprises: only requiring two tables, i.e. a root key index table and a key metadata table, which are respectively used for storing an index value and key metadata; acquiring the index value by a cyclical left shift of the root key index table; and positioning the key metadata in the key metadata table by using the index value to form a final root key. The method guarantees the root key from not being exposed in the FLASH to the greatest extent without complicated calculations. The tables in the present invention are only used for interfering the storage of the key, so as to achieve an aim of hiding the key; and the tables in the present invention occupy a space of (256+32) bytes, while an original key table has a combination of 256 factorial, and the final root key also has a combination of 25632, so that the root key is well hided on a vehicle-mounted FLASH at a low cost.

Description

technical field [0001] The invention relates to a method for securely storing root keys required for encryption authentication in FLASH. Background technique [0002] If the circuit board is fired, the program stored in the circuit FLASH is copied, and the fruits of hard work will be copied and used by others at no cost. Therefore, it is necessary to design an encryption authentication process, and encryption authentication needs to store some keys. Usually the root key required for encryption authentication is mixed with the program and stored on FLASH, and the root key is very important. If it is exposed, the process of encryption authentication will be cracked, so a more reliable one is needed. Root key storage method to address this need. [0003] The commonly used methods of storing keys are to decompose and restore the final key through calculation. For example, use the original key and the random number to perform XOR operation to decompose and restore the key, and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F21/57
CPCG06F21/57G06F21/62
Inventor 赵国开任赋陈华云郑福弟
Owner XIAMEN YAXON NETWORKS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products