Key generation method and device, computer device and storage medium

A technology of key generation device and computer equipment, which is applied to encryption device with shift register/memory and key distribution, which can solve the problems of low data security, insecure key information, and unavoidable guarantee of data security, etc. Achieve the effect of avoiding data insecurity, reducing correlation and evenness

Active Publication Date: 2019-06-28
RAMAXEL TECH SHENZHEN
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the above method, there is a hidden danger of key information being insecure by manually filling in the key table through software, and the AES key used is determined by the ID of the logical block address, and there are multiple logical block

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key generation method and device, computer device and storage medium
  • Key generation method and device, computer device and storage medium
  • Key generation method and device, computer device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0056] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0057] It should also be understood that the terminology used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a key generation method and device, a computer device and a storage medium. The method comprises the steps of obtaining an ID of a logic block address; obtaining a product serial number and a key length of the solid state disk; And performing key derivation processing by using the ID of the logic block address, the product serial number and the length to obtain a key. According to the invention, the serial number of the product is identified. Through performing key derivation processing on the set key length and the ID of the logical block address in the meta-information header, processing is carried out by adopting a splicing algorithm and a national cryptography SM3 algorithm. Key table does not need to be manually filled in. According to the method, the used AESsecret keys are determined according to the ID of the logical block addresses, the product serial number and the set secret key length are combined, it can be avoided that a plurality of logical block addresses use one set of secret keys, the data insecurity situation caused by cracking of secret key table information is avoided, and the correlation and the primitiveness between all sets of AES secret keys can be reduced.

Description

technical field [0001] The present invention relates to a solid-state hard disk, and more specifically refers to a key generation method, device, computer equipment and storage medium. Background technique [0002] Most of the encryption standards used by SSDs for data are Advanced Encryption Standards to ensure data security. The current AES (Advanced Encryption Standard, Advanced Encryption Standard) key is manually written into the key table through software, and manually updated and updated. Managed keys and key tables. The use process of the AES key is as follows figure 1 As shown, there are 32 sets of keys in the key table that need to be filled in manually, and one set of keys is used for every 8 logical block addresses. The AES key acquisition and use process is as follows: When the data needs to be encrypted and decrypted by AES, the ID field of the smallest mapping unit in the meta-information header is used to calculate the ID of the corresponding logical block ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/06
Inventor 马越冯元元周晨杰周强
Owner RAMAXEL TECH SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products