A password evaluation test system and a password evaluation test method

A test system and test method technology, applied in transmission systems, digital transmission systems, encryption devices with shift registers/memory, etc., can solve problems such as hardware and software tool verification, algorithm strength and randomness not provided

Active Publication Date: 2021-05-25
北京六合安通科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

After the algorithm is customized by the user, even the supplier cannot decipher it if the key is unknown
However, the consistency, algorithm strength, and randomness achieved by user-defined algorithms have not provided corresponding hardware and software tools for verification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A password evaluation test system and a password evaluation test method
  • A password evaluation test system and a password evaluation test method
  • A password evaluation test system and a password evaluation test method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] This embodiment applies the password evaluation system and method to the user's drone, see the attached figure 1 , the system block diagram of the password evaluation test system of the present embodiment, the hardware equipment includes:

[0072] (1) encryption machine, described encryption machine comprises airborne encryption machine, ground encryption machine and RVT encryption machine in use, and is connected with plaintext output port and ciphertext output port by respective link interface, is used for loading cryptographic algorithm , and conduct an encryption strength test and verification on the strength of the actual loaded password;

[0073] (2) An encryption set key generation filling unit, including a key generator and a key injector, the key generator is composed of a key data processing card and a management host, and is used to generate key data. The key injector is used to receive the key generated by the key generating device and inject it into the en...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a cryptographic evaluation test system, comprising: (1) an encryption machine; (2) an encryption set key generation filling unit, including a key generator and a key injector; (3) testing and measuring equipment, including data Collector, digital oscilloscope and logic analyzer; (4) data analysis unit, including interconnected commercial computers, switches and servers; (5) function tester; and (6) analog working terminals, including analog airborne data terminals, Ground data terminal and RVT data terminal. Corresponding methods are also disclosed, including: 1. Perform encryption: select an encryption algorithm; select a plaintext and a key to encrypt; output to a file to form a ciphertext; 2. Execute detection: select a detection method; determine input content; detect according to the input content ;3. Execution comparison: select the algorithm of the detection method; upload the user detection tool; call the original system and the user uploaded detection tool to perform detection; compare the detection results.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a password evaluation test system based on advanced encryption standards and a corresponding password evaluation test method. Background technique [0002] AES is an iterative, symmetric key block cipher. According to the algorithm design, the length of the working key is 256 bits, and the length of the information key is 128 bits. For the AES algorithm, operations are performed on a two-dimensional byte array called the state. A state consists of 4 lines, each line includes Nb bytes, Nb is equal to the packet length divided by 32, and the information key length is 128 bits, therefore, Nb=4, this value reflects the number of 32bit words in the state ( number of columns); the length of the working key is 256 bits, therefore, Nk=8, which reflects the number of 32-bit words (number of columns) in the key. The round number Nr of the AES algorithm only depends on the ke...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/36H04L9/06
CPCH04L9/0631H04L9/36
Inventor 金希俊
Owner 北京六合安通科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products