Key storage method

A key storage and key technology, applied in the field of information security, can solve the problems of increasing the probability of reading data errors and the time of reading data, hidden dangers of key data security, and the inability to change the encryption factor at any time, so as to increase the strength. , the effect of key storage security

Inactive Publication Date: 2018-07-06
AEROSPACE INFORMATION
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The encryption factor is used to encrypt, and the encryption factor cannot be changed at any time. If the encryption factor is leaked during the period when the encryption factor is not changed, the entire key data may have a security risk
Using the method of decentralized storage, in the process of key data storage and extraction, it is possible to store or extract a large amount of data from the storage medium at one time, or to complete the storage and extraction operations through multiple interactions with the storage medium, modifying the storage medium in large numbers, It will reduce the life of the storage medium, increase the error probability of reading data and the time to read data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key storage method
  • Key storage method
  • Key storage method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to facilitate the understanding of the embodiments of the present invention, several specific embodiments will be taken as examples for further explanation below in conjunction with the accompanying drawings, and each embodiment does not constitute a limitation to the embodiments of the present invention.

[0041] Such as figure 1 As shown, a key storage method, the method includes:

[0042] Step S110, using a hardware random number generator to generate a true random number R1, which is used as an encryption factor for this storage. This encryption factor needs to be replaced every time it is stored. The true random number R1 is only valid in one storage as an encryption factor. For example, a true random number R1′ needs to be regenerated when the master key is stored next time.

[0043] Step S120, use the true random number R1 to generate a seed, and put the seed into the linear feedback shift register LSFR to obtain a pseudo-random number.

[0044] Step S...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a key storage method. The method comprises the following steps: generating a true random number by using a hardware random number generator, wherein the true random number isused as an encryption factor of the present storage; generating a seed by using the true random number, and substituting the seed into a linear feedback shift register to obtain a pseudo random number; performing an xor operation on a master key and the pseudo random number to obtain a random master key, and then encoding the random master key by using an error correcting code algorithm to obtainencoded data; performing private algorithm transformation on the true random number to obtain intermediate data, wherein the intermediate data are used as error locations of data to be stored to tamper the encoded data to obtain error code data; and performing encrypted storage on the error code data. According to the key storage method provided by the invention, the generated random number is hidden in the data to be protected, thereby improving the intensity of data randomization. In the case of limited storage resources, in order to prevent brute force attacks after ciphertext leakage, thedata are mixed with error codes, and the data are encrypted by using a private algorithm, so that the key storage is more secure.

Description

technical field [0001] The invention relates to the field of information security, in particular to a key storage method. Background technique [0002] Key management is a key link in the security of cryptographic devices. Generally, cryptographic devices support at least three layers of key structures: master key, user key, and session key. [0003] Master key: The user protects the security of other keys and sensitive information in the cryptographic device, including the management, backup, recovery of other keys, and administrator authentication of the cryptographic device. Different cryptographic devices have different master keys. The master key must be stored securely. [0004] User key: including signature encryption key pair and key encryption key. The signature encryption key pair is used to implement user signature, verification, identity authentication and session key protection negotiation, etc., representing the identity of the user or application. The key e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08G06F21/60
CPCG06F21/602H04L9/0869H04L9/0894
Inventor 史龙真邵波王璞杨硕
Owner AEROSPACE INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products