Public key password calculation method and system based on Intel SGX mechanism

A technology of public key cryptography and calculation method, which is applied in the directions of public keys, transmission systems, and digital transmission systems of secure communication, and can solve the problems of low performance and high performance overhead of public key cryptography systems.

Active Publication Date: 2019-03-22
INST OF INFORMATION ENG CAS
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the complexity of the calculation of difficult mathematical problems, the existing public key cryptosystem is usually computationally intensive, and has the disadvantages of time-consuming calculation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Public key password calculation method and system based on Intel SGX mechanism
  • Public key password calculation method and system based on Intel SGX mechanism
  • Public key password calculation method and system based on Intel SGX mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to make the objectives, technical solutions, and advantages of the present invention clearer, the present invention will be further described in detail through examples below.

[0055] This example uses the AES-256-GCM algorithm to encrypt and decrypt, and the HMAC-SHA256 algorithm to sign and verify.

[0056] The Private enclave is launched for the first time, and a 256-bit private key mk is randomly generated.

[0057] Private enclave calls SGX sealed API to encrypt and store mk.

[0058] The Public enclave is launched for the first time, and it performs SGX remote authentication to request the public key from the Private enclave. Send a public key request to the Private enclave to generate a temporary key pair (sk tmp ,pk tmp ), issue SGX remote assertion proof Q=Quote(pk tmp ).

[0059] After receiving Q, Private enclave calls the enclave authentication API provided by Intel for verification. If the verification passes, use pk tmp The public key, namely mk, is e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a public key password calculation method and system based on an Intel SGX mechanism. The method comprises the following steps of 1) generating Public enclave and Private enclave independent of each other, which are application running environments providing isolated execution based on the Intel SGX mechanism respectively; deploying the Public enclave in an encrypted messagesender terminal or a signed message verifier terminal, and deploying the Private enclave in an encrypted message receiver terminal or a signed message generator terminal; and 2) when the Private enclave is started for the first time, generating a private key; and when the Public enclave is started for the first time, executing SGX remote authentication for the Private enclave to request for a public key identical to the private key. According to the public key password calculation method and system, the public key password calculation is realized securely and efficiently.

Description

Technical field [0001] The invention belongs to the field of computer technology and information security technology, and specifically relates to a public key cryptographic calculation method and system based on the Intel SGX mechanism. Background technique [0002] The public key cryptosystem is the basic security component of Internet applications and protocols, supports various Internet standards, and is widely used in various Internet security services. Generally, public-key cryptosystems use public-key cryptographic algorithms based on mathematically difficult problems, such as factorization of large integers, discrete logarithm problems, and discrete logarithm problems on elliptic curves. Due to the computational complexity of difficult mathematical problems, the existing public key cryptosystems are usually computationally intensive, and have the disadvantages of time-consuming computation and high performance overhead. Compared with the symmetric cryptosystem based on pe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30H04L9/32H04L9/08H04L9/06
CPCH04L9/0631H04L9/0643H04L9/0819H04L9/0861H04L9/0894H04L9/30H04L9/3247
Inventor 林璟锵黎火荣蔡权伟欧阳文宜荆继武王伟
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products