Unlock instant, AI-driven research and patent intelligence for your innovation.

Key decryption board, key decryption device, key decryption system and key decryption processing method

A key and card technology, applied in the field of data security, can solve the problems of difficult large-scale application, high implementation cost, poor flexibility, etc., and achieve the effect of improving the decryption speed, fast decryption speed and simple structure

Active Publication Date: 2017-07-18
桀安信息安全技术(上海)有限公司
View PDF12 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, software can implement DES decryption by supercomputer or distributed computing system. The advantage is flexible programming. The disadvantage is that the implementation cost is high, which makes it difficult to apply on a large scale. ASIC can provide high-performance algorithms, but the flexibility is poor. Considering this The range of market users for similar chips is small, and ASIC manufacturers have no intention of producing related products

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key decryption board, key decryption device, key decryption system and key decryption processing method
  • Key decryption board, key decryption device, key decryption system and key decryption processing method
  • Key decryption board, key decryption device, key decryption system and key decryption processing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to make the technical problems, technical solutions and advantages to be solved by the present invention clearer, the following will describe in detail with reference to the drawings and specific embodiments.

[0033] On the one hand, the embodiment of the present invention provides a key decryption board 10, such as figure 1 As shown, it includes a motherboard 1 and a control daughter card module 2 arranged on the motherboard, a plurality of processing daughter card modules 3 and a power supply module 4, wherein the motherboard is used to provide control daughter card modules and multiple processing daughter card modules Inter-communication provides a transmission line 5; the control sub-card module is used to send data and control instructions to multiple processing sub-card modules through the transmission line on the motherboard, and read the processing results fed back by multiple processing sub-card modules; multiple processing sub-card modules The card m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key decryption board, a key decryption device, a key decryption system and a key decryption processing method, wherein the key decryption board, the key decryption device, the key decryption system and the key decryption processing method belong to the technical field of data safety. The key decryption board comprises a motherboard, a control daughter board module, a plurality of processing daughter board modules and a power supply module, wherein the control daughter board module, the plurality of processing daughter board modules and the power supply module are arranged on the motherboard. The motherboard is used for supplying a transmission line for communication between the control daughter board module and the plurality of processing daughter board modules. The control daughter board module is used for transmitting data and control instructions to the plurality of processing daughter board modules through the transmission line on the motherboard and reading processing results which are feedback from the plurality of processing daughter board modules. The plurality of processing daughter board modules are used for receiving data and control instructions which are transmitted from the control daughter board module, decrypting the key and performing feedbakc of the processing results to the control daughter board modules. The power supply module is used for supplying electric power to the control daughter board module and the plurality of processing daughter board modules. The key decryption board has advantages of simple structure, high decryption speed and high efficiency.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a key decryption board, device, system and processing method. Background technique [0002] The DES algorithm is usually used to encrypt key data, that is, a 64-bit key and a 64-bit plaintext are given, and a 64-bit encrypted ciphertext is obtained after DES operation. For DES key cracking, it is given 64-bit plaintext and 64-bit ciphertext to solve the 64-bit key. According to the DES algorithm, the 64-bit key is actually generated by 56 bits through a given shift XOR operation, so the DES key cracking problem is to know the 64-bit plaintext input block and 64-bit ciphertext output in advance. On a block basis, a 56-bit key is solved. The traditional brute force cracking method of DES keys is as follows: generate a 56-bit key by traversing, pass the 64-bit plaintext through the DES encryption algorithm to obtain a 64-bit ciphertext, and compare the generated ciphertext w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00
CPCH04L9/00H04L2209/125
Inventor 王媛媛陈庶樵
Owner 桀安信息安全技术(上海)有限公司