Device and method for ensuring consistent encrypted behavior of redundant execution body

An executor and encryption algorithm technology, applied in secure communication devices and key distribution, can solve problems such as large system overhead and inability to guarantee security, and achieve the effect of guaranteeing operation results

Active Publication Date: 2022-04-08
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF16 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the pseudo-random number generator is implemented by software, its security cannot be guaranteed. If the real random number is implemented by software and hardware, it will be a great overhead for the system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device and method for ensuring consistent encrypted behavior of redundant execution body
  • Device and method for ensuring consistent encrypted behavior of redundant execution body

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] Embodiment one, such as figure 1 As shown, a device for ensuring consistent encryption behavior of redundant executives is used in information control systems with high security requirements, and includes multiple redundant executives 10 , a scheduler 11 and a random number generator 12 .

[0030] The redundant execution body 10 is connected with the scheduler and is used to execute the application program. Each redundant execution body is equivalent in function and can be homogeneous or heterogeneous in structure. It runs on it including encryption algorithms in A series of applications within the scheduler perform encryption and other calculations according to the input of the scheduler, and output the calculation results to the scheduler.

[0031] The scheduler 11 is used for the management of redundant execution bodies, input and output agents and other related operations, such as receiving external input and distributing input data to each redundant execution body;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to the technical field of encryption protection and the technical field of system architecture that adopts redundant design and requires comparison results of redundant executives, and in particular relates to a device for ensuring consistent encryption behavior of redundant executives, including multiple synchronously running isomorphic or Heterogeneous redundant execution body, scheduler and random number generator; redundant execution body, used to execute the application program, and output the operation result to the scheduler; scheduler, used for various management and input of redundant execution body Output agent; random number generator, used to collect the random number influencing factors in the system, calculate the random number sequence, and output the random number sequence to the scheduler. The invention also relates to a method for ensuring consistent encryption behavior of the redundant execution body. The invention can ensure that the encryption behaviors on the redundant execution bodies are consistent, and the output results can be compared and judged.

Description

technical field [0001] The invention relates to the technical field of encryption protection and the technical field of system architecture adopting redundant design and requiring comparison results of redundant executives, in particular to a device and method for ensuring consistent encryption behavior of redundant executives. Background technique [0002] In order to improve the security of existing information systems, system redundancy design appears, including homogeneous redundancy design and heterogeneous redundancy design. A system with redundant design needs to compare the output of each redundant executive body to judge whether the output result is correct. [0003] The following difficulties exist in the application of encryption technology in redundant systems: Even if different platforms implement the same encryption algorithm, the secret keys generated due to different sources of random number seeds will be different, resulting in different encryption results, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/0869H04L9/088
Inventor 于洪张兴明宋克沈剑良谭力波魏帅陈艇张帆
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products