Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Implementation method and device for generating key pair in embedded system

An embedded system, a technology for generating keys, applied in the field of information security, which can solve problems such as hidden dangers and irresistibility

Active Publication Date: 2018-07-20
FEITIAN TECHNOLOGIES
View PDF12 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the other hand, the RSA key pair generated by the above method cannot resist the commonly used Pollard's p-1 attack method because the large prime number used is a probability prime number
In occasions with relatively high security requirements, the above method will have certain hidden dangers. Therefore, it is urgent to provide an implementation method for generating key pairs using deterministic prime numbers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method and device for generating key pair in embedded system
  • Implementation method and device for generating key pair in embedded system
  • Implementation method and device for generating key pair in embedded system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0139] Embodiment 1 of the present invention provides an implementation method for generating a key pair, such as figure 1 shown, including:

[0140] Step 101: when the CPU receives the command to generate a key pair, obtain the RSA public key index, RSA modulus length, and RSA key pair type from the command to generate a key pair;

[0141] For example, the RSA module length in this embodiment is 1024, the RSA public key index is 0x010001, and the RSA key pair type is the CRT type;

[0142] Step 102: the CPU invokes the random number generation interface to generate the first seed matching the security of the RSA modulus length;

[0143] For example, the first seed generated in this embodiment is 0x1111111111111111111111111111111111111;

[0144] In this embodiment, step 102 includes:

[0145] Step 201: the CPU calculates the security bit strength of the RSA algorithm according to the RSA modulus length;

[0146] For example, the security bit strength in this embodiment is ...

Embodiment 2

[0245] Embodiment 2 of the present invention provides an implementation device for generating a key pair in an embedded system, such as Figure 6 shown, including:

[0246] The first obtaining module 601 is used to obtain the RSA public key index, RSA modulus length, and RSA key pair type from the generating key pair instruction when receiving the generating key pair instruction;

[0247] The first generation module 602 is used to call the random number generation interface to generate the first seed that matches the security of the RSA modulus length;

[0248] Specifically, the first generating module 602 in this embodiment includes:

[0249] The first calculation submodule is used to calculate the security bit strength of the RSA algorithm according to the RSA modulus length;

[0250] The first generation submodule is used to call the random number generation interface to generate the first seed corresponding to the security bit strength of the RSA algorithm.

[0251] The...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an implementation method and device for generating a key pair in an embedded system. The method includes the following steps: a CPU obtains an RSA public key index, the RSA modulus length and the RSA key pair type from a received instruction of generating a key pair; a first seed matched with security of the RSA modulus length is generated; a first certainty prime number and a second certainty prime number are generated according to the RSA modulus length, the first seed and the RSA public key index; and an RSA public key modulus and an RSA private key corresponding tothe key pair type are generated according to the RSA modulus length, the RSA public key index, the first certainty prime number and the second certainty prime number, an RSA public key is formed according to the RSA public key modulus and the RSA public key index, and the SA public key and the RSA private key are stored. The technical scheme of the invention improves security of generating the keypair.

Description

technical field [0001] The invention relates to the field of information security, in particular to an implementation method and device for generating a key pair in an embedded system. Background technique [0002] In the RSA cryptosystem, the security of the system is based on the following problem: it is easy to multiply two large prime numbers, but it becomes very difficult to factorize their product in turn. Therefore, the security of the RSA cryptosystem is the same as Prime number determination and large number decomposition are closely related, and the key to the security of the RSA cryptosystem lies in the selection of large prime numbers p and q. After cryptanalysis (such as Pollard's p-1 method, Williams' p+1 method, cycle attack method, etc.) It is found that a class of prime numbers has some weak characteristics. According to these weak characteristics, an attacker can directly obtain useful information or even completely crack the cryptographic system by decompo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/06
CPCH04L9/0643H04L9/0863H04L9/0869
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products