Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Hardware encryption and decryption system and method

An encryption and decryption, encryption and decryption module technology, applied in the field of hardware encryption and decryption systems, can solve the problems of reducing the processing efficiency of data packet encryption and decryption, increasing CPU operating load, increasing CPU resource utilization, etc.

Active Publication Date: 2019-09-27
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the encryption and decryption process of a data packet may need to undergo multiple algorithm (such as SM3, SM4, etc.) processing, and after each algorithm processing is completed, it needs to be traced back to the CPU to re-plan the data packets that have not completed the encryption and decryption process. Once the algorithm is processed until the data packet completes all the encryption and decryption algorithm steps; however, in the above encryption and decryption process, the data packet needs to be sent back multiple times between the CPU and the FPGA to complete the encryption and decryption process, which increases the resource utilization of the CPU , increasing the operating load of the CPU; at the same time, the multiple return process will also reduce the efficiency of data packet encryption and decryption processing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware encryption and decryption system and method
  • Hardware encryption and decryption system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0045] It should be noted that when a component is considered to be "connected" to another component, it may be directly connected to the other component or there may be an intervening component at the same time.

[0046] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the technical field of the invention. The terms used herein in the description of the present in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a hardware encryption and decryption system and method. The hardware encryption and decryption system comprises a receiving buffer module, an allocation module, an algorithm pool, a collection module, an intermediate buffer module and a sending buffer module which are integrated in an encryption and decryption module. The invention discloses a hardware encryption and decryption system and method. Algorithms in an algorithm pool can be called for multiple times for data packets of different protocols such as TLS / IPsec sent into an encryption and decryption module; according to the encryption and decryption method and device, the encryption and decryption of the data packet are completed, the data packet which is completely processed and decrypted is output through the sending buffer module, the whole encryption and decryption processing process does not need processor logic intervention, the operation load of a processor is reduced, maximum utilization of algorithm resources is achieved, and the encryption and decryption processing efficiency of the data packet is effectively improved.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a hardware encryption and decryption system and method. Background technique [0002] FPGA (Field-Programmable Gate Array), that is, Field Programmable Gate Array, is a product of further development on the basis of programmable devices such as PAL, GAL, and CPLD. It emerged as a semi-custom circuit in the field of application-specific integrated circuits (ASIC), which not only solves the shortcomings of custom circuits, but also overcomes the shortcomings of the limited number of original programmable device gates. [0003] In the information age where information security is increasingly valued by people, data processing and storage products require not only the function of processing data, but also the functions of virus protection and encryption and decryption. In response to this requirement, there are currently two schemes on the market, software encryption and decry...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60H04L9/14H04L9/06
CPCG06F21/602H04L9/06H04L9/14
Inventor 孙晓鹏彭金辉廖正赟刘武忠韩金池卫志刚张晓龙徐瑞军石淑英
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products