Unlock instant, AI-driven research and patent intelligence for your innovation.

Data encryption method, decryption method, encryption system and decryption system

A data encryption and data decryption technology, which is applied in the field of encryption and decryption, can solve problems such as easy cracking of keys and unsatisfactory data security, and achieve the effect of saving data transmission resources

Active Publication Date: 2021-01-19
SHANGHAI FUDAN MICROELECTRONICS GROUP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing masked key stored in the memory is still easy to be cracked, and the data security still cannot meet the needs of users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method, decryption method, encryption system and decryption system
  • Data encryption method, decryption method, encryption system and decryption system
  • Data encryption method, decryption method, encryption system and decryption system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] At present, when the FPGA uses a memory to store the key, the result of the mask operation on the key is usually stored in the memory during the data encryption process, and then in the data decryption process, the FPGA can obtain the mask operation result in the memory And restore the key to complete the data decryption.

[0040] Due to the high correlation between the result of the mask operation and the key, the attacker can easily crack the key by obtaining the result of the mask operation in the memory, which will eventually lead to data leakage, making it difficult to meet the requirements for data security. .

[0041] In view of the above problems, an embodiment of the present invention provides a data encryption method. In the process of encrypting data, by storing the auxiliary data corresponding to the first real response data of the PUF module in the second memory, and then encrypting the data When decrypting, it is necessary to first obtain the first real r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A data encryption method, a decryption method, an encryption system, and a decryption system are provided. The encryption method comprises the following steps that a processor obtains the first real response data initialized by a PUF module, generates an encryption key based on the first real response data, and sends the encryption key to an encryption device; the encryption device encrypts the data to be encrypted by using the encryption key and stores the encrypted data in a first memory; and the second memory acquires the auxiliary data corresponding to the first real response data and stores the auxiliary data. The application of the scheme can improve the security of the data.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of encryption and decryption, and in particular to a data encryption method, a decryption method, an encryption system, and a decryption system. Background technique [0002] Field Programmable Gate Array (Field-Programmable Gate Array, FPGA) is further developed on the basis of programmable devices such as Programmable Logic Array (Programmable Logic Array, PAL) and General Logic Array (Generic Logic Array, GAL). of. As a semi-custom circuit in the field of application-specific integrated circuits (ASIC), FPGA not only solves the shortcomings of custom circuits, but also overcomes the shortcomings of the limited number of original programmable device gate circuits. [0003] Products developed using FPGAs will eventually generate bitstream profiles with specific functions. When the FPGA starts, it needs to read and download the bit stream configuration file from the outside. To e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60H04L9/08
CPCG06F21/602H04L9/0869H04L9/0894
Inventor 俞军刘丹李清王立辉雷婉刘帅张弛
Owner SHANGHAI FUDAN MICROELECTRONICS GROUP