Supercharge Your Innovation With Domain-Expert AI Agents!

Cipher device and data encryption and decryption method thereof

A cryptographic device, encryption and decryption technology, applied in the field of information security, can solve problems such as restricting the application of mobile terminals, and achieve the effect of expanding application scenarios and meeting the needs of cryptographic services with multiple security levels

Active Publication Date: 2019-04-23
武汉船舶通信研究所
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Conventional hardware encryption devices only provide one encryption algorithm for data encryption and decryption, and mobile terminals are suitable for application scenarios that require encryption and decryption of one encryption algorithm, but few application scenarios require encryption and decryption of one encryption algorithm, which limits the application of mobile terminals to more scenes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cipher device and data encryption and decryption method thereof
  • Cipher device and data encryption and decryption method thereof
  • Cipher device and data encryption and decryption method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0046] In order to facilitate the understanding of the technical solutions provided by the embodiments of the present invention, the cryptographic device is firstly introduced. Exemplarily, the cryptographic device may be a hardware cryptographic device, and the hardware cryptographic device may be a dedicated cryptographic chip. figure 1 It is a schematic structural diagram of an exemplary hardware encryption device. see figure 1, the cryptographic device includes a main control processor 1 , an algorithm coprocessor 2 , an external memory 3 , and a communication interface 4 .

[0047] The main control processor 1 is used to control all transaction operations of the entire cryptographic device.

[0048] Algorithm coprocessor 2 is u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cipher device and a data encryption and decryption method thereof, and belongs to the technical field of information security. The method comprises the following steps: receiving, by a main control processor of the cipher device, a cipher service instruction sent by a mobile terminal, wherein the cipher service instruction comprises a cipher algorithm identifier, the cipher device is a hardware cipher device and is installed in the mobile terminal; when a target code of a cipher algorithm is stored in an internal memory of an algorithm coprocessor of the cipher deviceand the cipher algorithm identifier of the target code of the cipher algorithm is not the cipher algorithm identifier contained in the cipher service instruction, extracting the target code of the cipher algorithm indicated by the cipher algorithm identifier contained in the cipher service instruction from an external memory of the cipher device, and loading the extracted target code of the cipher algorithm to the internal memory, wherein the target codes of at least two cipher algorithms are stored in the external memory; and controlling the algorithm coprocessor to decrypt to-be-decrypted data or encrypt to-be-encrypted data via the target code of the cipher algorithm in the internal memory.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a cryptographic device and a data encryption and decryption method thereof. Background technique [0002] In the process of using mobile terminals for communication, there is a risk of leakage of user personal identity information, voice, image, and video data. In order to provide communication security, a cryptographic device (also called an encryption device) is built into the mobile terminal. A cryptographic device is a security tool used to realize basic cryptographic operations of data encryption and decryption through cryptographic algorithms. Common cryptographic devices include hardware cryptographic devices. [0003] The hardware encryption device adopts a specific hardware circuit or a dedicated encryption chip to realize data encryption and decryption. The data encryption and decryption method flow provided by a conventional hardware cryptographic devic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
CPCH04L9/0625H04L9/0631H04L2209/12
Inventor 刘海峰严新荣付俊程川邓超龚智蔺祥楠刘四超金婵鸣
Owner 武汉船舶通信研究所
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More