Supercharge Your Innovation With Domain-Expert AI Agents!

A Method of Preventing Injection Attacks for Coprocessors of Public Key Cryptography Algorithms

A technology of coprocessor and cryptographic algorithm, applied in the direction of public key of secure communication, digital transmission system, secure communication device, etc. The effect of injection attacks

Active Publication Date: 2022-03-18
兆讯恒达科技股份有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Injection attacks take advantage of this, and use injection methods to destroy various calculation parameters in a targeted manner, resulting in the exhaustion of coprocessor resources and abnormal occurrences.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method of Preventing Injection Attacks for Coprocessors of Public Key Cryptography Algorithms
  • A Method of Preventing Injection Attacks for Coprocessors of Public Key Cryptography Algorithms
  • A Method of Preventing Injection Attacks for Coprocessors of Public Key Cryptography Algorithms

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only some embodiments of the present invention, rather than all embodiments . Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0045] The public key cryptography algorithm, that is, encryption and decryption do not use the same key: encryption uses public key parameters to operate on plaintext, and decryption uses private key parameters to operate on ciphertext. The key parameters of the public key cryptography algorithm are closely related to large prime numbers, and many times of large prime number calculations are also involved in the calculation process; there ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention relates to a method for preventing an injection attack of a coprocessor of a public key cryptographic algorithm, wherein the method includes: initializing the encryption and decryption path status word, and obtaining the calculation type; when the calculation type is an encryption type, Obtain the first plaintext and the first and second public key parameters and perform the first verification. After the verification is successful, encrypt the first plaintext; when the calculation type is the decryption type, obtain the first ciphertext and the first, second, and Three, four, five private key parameters, the second verification is performed on the first and second private key parameters, and the third verification is performed on the third and fourth private key parameters according to the first and second private key parameters after the verification is successful. After the verification is successful, the fourth verification is performed on the first ciphertext according to the first ciphertext, the first and the second private key parameters, and the first ciphertext is decrypted after the verification is successful. The method provided by the invention completes the prevention of injection attacks through the anti-injection verification of encryption and decryption parameters.

Description

technical field [0001] The invention relates to the technical field of single-chip microcomputers, in particular to a method for preventing injection attack of a public key cryptographic algorithm coprocessor. Background technique [0002] The public key cryptography algorithm is an asymmetric algorithm, that is, encryption and decryption do not use the same key to complete: the encryption of the plaintext is completed using the public key, and the decryption of the ciphertext is completed using the private key. The existing public key cryptographic algorithm is an algorithm (abbreviated as RSA) named after the last names of the three inventors Rivest-Shamir-Adleman. As a public key cryptographic algorithm coprocessor, the RSA algorithm coprocessor has been widely used in secure computing single-chip computers, mainly used to improve the data encryption and decryption capabilities of single-chip computers. Due to the characteristics of the algorithm itself, the RSA algorith...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L9/40
CPCH04L63/1466H04L63/0442H04L9/3066
Inventor 李立范振伟焦英华
Owner 兆讯恒达科技股份有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More