A security chip multi-module combination verification method
A security module and security chip technology, applied in the direction of internal/peripheral computer component protection, etc., can solve the problems of complex evaluation of security chips, multiple and single application scenarios of security chips, and achieve the effect of increasing the probability of being randomly interrupted
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0024] The following is an example to illustrate the specific implementation method. A certain foreign security chip is used as an illustration. It supports SHA-1, SHA-256, MD5, DES, TDES, RSA, ECC, CRC and other algorithms, with GPIO interface, RNG random Count, WDT (watchdog), Timer (timer), Systick (counter) and other functions.
[0025] Do initialization work before the verification process starts. The chip has a total of N (N=8) algorithms such as SHA-1, SHA-256, MD5, DES, TDES, RSA, ECC, and CRC, and an array length of N( For the array A[N] of N=8), the initialization array A[N] is all 0, that is, A[N]={0,0,0,0,0,0,0,0}; the N security modules The numbers are:
[0026] SHA-1: (1)
[0027] SHA-256: (2)
[0028] MD5: (3)
[0029] DES: (4)
[0030] RSA: (5)
[0031] TDES: (6)
[0032] ECC: (7)
[0033] CRC: (8)
[0034] ...: (... to N)
[0035] After the above initialization work is done, the verification process starts:
[0036] The first step is to initialize t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


