Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A Method of Preventing Injection Attack of Advanced Encryption Standard Coprocessor

An advanced encryption standard and co-processor technology, applied in the field of single-chip microcomputers, can solve the problems of data storage space destruction, miscalculation, data destruction, etc., and achieve the effect of ensuring correct execution.

Active Publication Date: 2022-05-17
兆讯恒达科技股份有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The purpose of the injection attack on the coprocessor is to destroy the data of its internal storage unit through injection means, resulting in miscalculation in the execution of the algorithm.
Existing injection attack objects are mainly aimed at injecting damage to the internal data storage space of the coprocessor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method of Preventing Injection Attack of Advanced Encryption Standard Coprocessor
  • A Method of Preventing Injection Attack of Advanced Encryption Standard Coprocessor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only some embodiments of the present invention, rather than all embodiments . Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0051] The AES algorithm is a symmetric algorithm, that is, the key required for encryption and decryption is the same key. The required input parameters for AES coprocessor encryption include plaintext and key, that is, use the key to perform AES encryption on plaintext, and output the encrypted ciphertext as the result. After using the AES coprocessor to encrypt a set of plaintext, and then use the same key to decrypt the encrypted resul...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention relates to a method for preventing an injection attack of an AES coprocessor, comprising: initializing the encryption and decryption path status word; obtaining the first plaintext and the first key, and generating the first and second check codes; generating the second Two plaintexts and keys; perform the first anti-injection verification on the second plaintext and the first verification code; perform the second anti-injection verification on the second key and the second verification code; according to the second plaintext, the key , generate the first ciphertext and the third verification code; generate the second ciphertext, perform the third anti-injection verification on the second ciphertext and the third verification code; perform the fourth anti-injection verification; perform the fifth anti-injection verification Injection verification; the sixth anti-injection verification is performed on the status word of the encryption and decryption path. In the present invention, data verification is set for each read and write operation of physical reading and writing, and data verification is set before and after each key task node in the application layer, so as to achieve the purpose of preventing injection attacks, and by setting the encryption and decryption path status word to achieve Ensure that the anti-injection process is free from injection attacks.

Description

technical field [0001] The invention relates to the technical field of single-chip microcomputers, in particular to a method for preventing injection attack of an Advanced Encryption Standard coprocessor. Background technique [0002] The Advanced Encryption Standard (Advance Encryption Standard, abbreviation: AES) coprocessor has been widely used in secure computing single-chip microcomputers, and is mainly used to improve the data encryption and decryption capabilities of the single-chip microcomputers. The purpose of the injection attack on the coprocessor is to destroy the data of its internal storage unit through injection means, resulting in miscalculation in the execution of the algorithm. The existing injection attack objects are mainly for injection damage to the internal data storage space of the coprocessor. Contents of the invention [0003] The purpose of the present invention is to provide an AES coprocessor anti-injection attack method for the existing tech...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L9/00
CPCH04L9/0631H04L9/002
Inventor 李立范振伟焦英华
Owner 兆讯恒达科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products