Unlock instant, AI-driven research and patent intelligence for your innovation.

A 128-bit symmetric key generation and protection device

A technology for protecting devices and symmetric keys, which is applied to encryption devices with shift registers/memory and key distribution, which can solve the problems of key security reduction and key exposure, so as to improve security and resist malicious hardware attacks Effect

Active Publication Date: 2019-04-05
BEIJING SCISTOR TECH +1
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For the first method, no matter how the device sends the key, the key may be intercepted, resulting in a decrease in the security of the key; for the second method, although the device does not output the key, the The key is stored in the device. The device that stores the key is usually a ROM-like non-volatile storage medium. Based on the current reverse engineering technology, the complete key can still be obtained from the storage medium. The same applies to the first method above. The problem
At the same time, in order to ensure the security of information, there are usually situations such as regularly updating keys and adding new keys, so the key protection device is required to have the ability to update online to adapt to the user's flexible management of keys. The online update process is also the same. Increased risk of key exposure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A 128-bit symmetric key generation and protection device
  • A 128-bit symmetric key generation and protection device
  • A 128-bit symmetric key generation and protection device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention will be further described in detail with reference to the accompanying drawings and embodiments.

[0024] figure 1 It shows the overall structure of the present invention, which is composed of A-section key management module, B-section key management module, key synthesis management module, SHA1 algorithm module, MD5 algorithm module and key storage module. The A-segment key management module is responsible for caching and verifying the A-segment key, feeding back the management status of the A-segment key to the host, programming the off-chip EEPROM, and reading the A-segment key from the off-chip EEPROM after the device is powered on. In the on-chip cache; the B-segment key management module is responsible for caching, verifying the B-segment key, and feeding back the management status of the B-segment key to the host. The key synthesis module is responsible for reading the A and B segment keys from the A and B segment key caches, combining the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a 128-bit symmetric secret key production and protection method. The device is characterized in that a seed secret key stored in the device is set as an A segment secret key; the seed secret key issued by a host is set as a B segment secret key; and a synthesis result is the secrete key. The device comprises following modules of at least one A segment secret key management module, at least one B segment secret key management module; at least one MD5 algorithm module; at least one SHA1 algorithm module; at least one secret key synthesis management module; and at least one secret key storage module. According to the device, exposure of the A segment secret key is avoided; and the device has the capability of resisting malicious attacks of software. According to the device, once the device leaves a host environment, the B segment secret key and the produced secret key are automatically destroyed; therefore, the device has the capability of resisting the malicious attacks of the software; and the security of the secrete is further improved.

Description

technical field [0001] The invention relates to a key generation and protection method in the technical field of information security, in particular to a 128-bit symmetric key generation and protection device. Background technique [0002] A key is a parameter that is entered in an algorithm that converts plaintext to ciphertext or ciphertext to plaintext. Keys are divided into symmetric keys and asymmetric keys. [0003] With the rapid development of information technology and the advent of the era of big data, various encryption algorithms are widely used in various industries. As the core of various encryption and decryption algorithms, keys will cause unpredictable losses once they are exposed. It can be seen that the key is important in the field of information security technology. [0004] At present, there are usually two ways to protect the key. One is to store the key in the hardware device and take it out from the hardware device in a specific way when it needs t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L9/08
CPCH04L9/0631H04L9/0816
Inventor 徐晓燕李高超周渊张露晨马秀娟唐积强徐小磊毛洪亮刘俊贤苏沐冉刘庆良何万江
Owner BEIJING SCISTOR TECH