Method for preventing injection attack of high-level encryption standard coprocessor

An advanced encryption standard and coprocessor technology, applied in the field of single-chip microcomputers, can solve the problems of data storage space destruction, miscalculation, and data destruction.

Active Publication Date: 2019-10-08
兆讯恒达科技股份有限公司
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The purpose of the injection attack on the coprocessor is to destroy the data of its internal storage unit through injection means, resulting in miscalculation in the execution of the algorithm.
Existing injection attack objects are mainly aimed at injecting damage to the internal data storage space of the coprocessor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for preventing injection attack of high-level encryption standard coprocessor
  • Method for preventing injection attack of high-level encryption standard coprocessor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only some embodiments of the present invention, rather than all embodiments . Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0051] The AES algorithm is a symmetric algorithm, that is, the key required for encryption and decryption is the same key. The required input parameters for AES coprocessor encryption include plaintext and key, that is, use the key to perform AES encryption on plaintext, and output the encrypted ciphertext as the result. After using the AES coprocessor to encrypt a set of plaintext, and then use the same key to decrypt the encrypted resul...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention relates to a method for preventing an injection attack of a high-level encryption standard coprocessor. The method comprises the following steps: initializing encryption and decryption path state words; obtaining a first plaintext and a first key, and generating a first check code and a second check code; generating a second plaintext and a key; performing first anti-injection check on the second plaintext and the first check code; performing second anti-injection check on the second key and the second check code; generating a first ciphertext and a third checkcode according to the second plaintext and the key; generating a second ciphertext, and performing third anti-injection check on the second ciphertext and the third check code; performing fourth anti-injection verification; carrying out fifth anti-injection verification; and performing sixth anti-injection check on the encryption and decryption path state word. The data verification is set at eachread-write operation of physical read-write, and the data verification is set before and after each key task node of the application layer, so that the purpose of preventing the injection attack is achieved, and the injection prevention process is ensured not to be subjected to the injection attack by setting the encryption and decryption path state words.

Description

technical field [0001] The invention relates to the technical field of single-chip microcomputers, in particular to a method for preventing injection attack of an Advanced Encryption Standard coprocessor. Background technique [0002] The Advanced Encryption Standard (Advance Encryption Standard, abbreviation: AES) coprocessor has been widely used in secure computing single-chip microcomputers, and is mainly used to improve the data encryption and decryption capabilities of the single-chip microcomputers. The purpose of the injection attack on the coprocessor is to destroy the data of its internal storage unit through injection means, resulting in miscalculation in the execution of the algorithm. The existing injection attack objects are mainly for injection damage to the internal data storage space of the coprocessor. Contents of the invention [0003] The purpose of the present invention is to provide an AES coprocessor anti-injection attack method for the existing tech...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/00
CPCH04L9/0631H04L9/002
Inventor 李立范振伟焦英华
Owner 兆讯恒达科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products