Unlock instant, AI-driven research and patent intelligence for your innovation.

Memory data encryption method and device and memory data decryption method and device

A technology of memory data and encryption method, which is applied in the fields of digital data protection, electrical digital data processing, computer security devices, etc.

Inactive Publication Date: 2018-06-22
TANGRAM MICROELECTRONICS TECH SHANGHAI CO LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Existing scheme 2 such as figure 2 As shown, when the plaintext is the same, the ciphertext under different addresses is completely different, but the attacker moves the ciphertext to his own physical address, and he can deduce the transformation relationship according to the difference in the plaintext, thereby correcting the difference caused by different addresses and making the encryption effect Regression to Option 1

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Memory data encryption method and device and memory data decryption method and device
  • Memory data encryption method and device and memory data decryption method and device
  • Memory data encryption method and device and memory data decryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to express the technical solutions and advantages of the embodiments of the present invention more clearly, the technical solutions of the present invention will be further described in detail below with reference to the drawings and embodiments.

[0027] image 3 It is a flow chart of the memory data encryption method of the present invention. Such as image 3 As shown, the first embodiment of the present invention proposes a memory data encryption method, comprising the following steps:

[0028] In step S301, the plaintext of the memory data is obtained, and the address information of the data is obtained.

[0029] Specifically, first read the data of the physical memory address, obtain the plaintext of the memory data, and obtain address information for reading and writing the physical memory.

[0030] Step S302, using an encryption algorithm to encrypt the plaintext for the first time to obtain a primary ciphertext.

[0031] Specifically, the processor ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a memory data encryption method and device and a memory data decryption method and device. The memory data encryption method comprises the following steps of: obtaining a plaintext of memory data and obtaining address information of the data; encrypting the plaintext for the first time by utilizing an encryption algorithm, so as to obtain a primary ciphertext; transformingthe primary ciphertext according to the address information of the data, so as to obtain an intermediate ciphertext; encrypting the intermediate ciphertext for the second time by utilizing the encryption algorithm, so as to obtain a final secondary ciphertext. According to the memory data encryption method, a method of encrypting data for twice in memory encryption, and carrying out address mixing in the ciphertext generated at the first time to increase the safety is utilized.

Description

technical field [0001] The invention relates to the fields of computer security and software encryption, in particular to a method and device for encrypting and decrypting memory data. Background technique [0002] Existing processors generally do not encrypt used memory data, but some processors can use symmetric encryption algorithms such as AES (Advanced Encryption Standard, Advanced Encryption Standard) to encrypt memory data. For example, in AMD's SEV solution, the logical isolation of data between different virtual machines and the data isolation between virtual machines and hosts are realized by using different encryption keys for different virtual machines. However, a symmetric encryption algorithm is used to encrypt the memory data. Under the premise that a large amount of encrypted data is generated using the same key, the attacker can also find the correlation between the plaintext data by detecting the collision of the ciphertext data. [0003] The encryption me...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/79
CPCG06F21/79G06F21/602
Inventor 王鹏飞应志伟杜朝辉
Owner TANGRAM MICROELECTRONICS TECH SHANGHAI CO LTD