A method and system for performing cryptographic operations in an operating system
An operating system and password technology, applied in the fields of computer technology and information security, it can solve the problems of high performance overhead, vulnerabilities that are not easy to repair, and high performance overhead, and achieve the effect of preventing attacks to obtain sensitive data such as keys.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0041] figure 1 It is a flow chart of the overall step of the method of the present invention. This embodiment performs an RSA decryption operation in the operating system, and the calculation results are directly output, mainly including the following steps:
[0042] 1. Protect the key to generate, such as figure 2 As shown, including the following steps:
[0043] 1) Modify the operating system kernel launch process, add the protection key generation process to ensure that the protection key generation process does not have any user state programs to start, run.
[0044] 2) Operating system starts, the protection key generation program is executed, the user operation interface displays the prompt information, prompt the operator input password.
[0045] 3) Operator input password.
[0046] 4) The password entered by the user as the input of the SHA-256 whisker algorithm, and the SHA-256 operation is performed, and the operation obtains 256 bits of the same value as the protectio...
Embodiment 2
[0078] In this embodiment, the SM4 encryption operation is performed in the operating system, and the operation result is output after the key is encrypted, mainly including the following steps:
[0079] 1. The protection key is generated, the protection key is placed in the privilege register and the loading password operation core module step is the same as in Example 1.
[0080] 2, user key generation,:
[0081] This Example 2 Selects that the password operator core module uses internal random numbers to generate user keys and derived after encryption, such as Figure 4 As shown, the specific process is as follows:
[0082] 1) User status call request password The kernel module directly generates a user key.
[0083] 2) Turn off the interrupt.
[0084] 3) Call the XBEGIN instruction to set the transaction ABORT jump address as the transaction ABORT handler.
[0085] 4) The password operation kernel module uses its internal random number as the input of the SM4 key generation alg...
Embodiment 3
[0104] This embodiment provides a system for password operation in an operating system, including:
[0105] Protect the key generation module, which is responsible for generating a protection key in the system initialization credibility, and stores the protection key in the privileged register of the system; the privileged register cannot be accessed by the user state program, and cannot be used as an operating system Other uses;
[0106] The user key generating module is responsible for generating a user key in the internal random number of the source data or password operation through the user-state program, and then outputs after encryption using the protection key;
[0107] The password operation module is responsible for providing the source data required for the user state program and after the user key encrypted by the protection key, complete the password operation; the password operation uses the protection key to decrypt the user key, then use the user The key completes th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


