Data encryption method, decryption method, encryption system and decryption system
A data encryption and data decryption technology, which is applied in the field of encryption and decryption, can solve problems such as easy cracking of keys and unsatisfactory data security, and achieve the effect of saving data transmission resources
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0039] At present, when the FPGA uses a memory to store the key, the result of the mask operation on the key is usually stored in the memory during the data encryption process, and then in the data decryption process, the FPGA can obtain the mask operation result in the memory And restore the key to complete the data decryption.
[0040] Due to the high correlation between the result of the mask operation and the key, the attacker can easily crack the key by obtaining the result of the mask operation in the memory, which will eventually lead to data leakage, making it difficult to meet the requirements for data security. .
[0041] In view of the above problems, an embodiment of the present invention provides a data encryption method. In the process of encrypting data, by storing the auxiliary data corresponding to the first real response data of the PUF module in the second memory, and then encrypting the data When decrypting, it is necessary to first obtain the first real r...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


