Supercharge Your Innovation With Domain-Expert AI Agents!

A method for preventing injection attack of data encryption standard coprocessor

A data encryption standard and coprocessor technology, applied in countermeasures against encryption mechanisms, encryption devices with shift registers/memory, digital transmission systems, etc., can solve the problem of destroying single-chip data encryption performance, single-chip application execution errors, etc. question

Active Publication Date: 2020-12-11
兆讯恒达科技股份有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The purpose of the injection attack on the coprocessor is to destroy the data encryption function of the single-chip microcomputer to which it belongs, and cause the upper-layer application execution error of the single-chip microcomputer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for preventing injection attack of data encryption standard coprocessor
  • A method for preventing injection attack of data encryption standard coprocessor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only some embodiments of the present invention, rather than all embodiments . Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0048] The DES algorithm is a symmetric algorithm, that is, the key required for encryption and decryption is the same key. After using the DES coprocessor to encrypt a set of plaintext, and then use the same key to decrypt the encrypted result (the inverse operation of encryption), the obtained plaintext should be consistent with the original plaintext. The DES algorithm is a block encryption algorithm. For the encryption of a super-large...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention relates to an injection attack prevention method for a data encryption standard coprocessor, and the method is characterized in that the method comprises the steps: obtaining a first plaintext and a first secret key, and storing the first plaintext and the first secret key; backing up the first secret key and generating a second secret key; performing first anti-injection verification on the first plaintext and the first key; performing encryption operation according to the first plaintext and the first key to generate a second ciphertext; performing decryptionoperation according to the second ciphertext to generate a third plaintext; performing second anti-injection verification on the third plaintext; performing third anti-injection verification accordingto the first secret key and the second secret key; performing fourth anti-injection verification according to the encrypted path state word; and after the fourth anti-injection verification succeeds,outputting the second ciphertext as a calculation result. According to the method, through four times of anti-injection verification, whether the data used in the calculation process is subjected tothe injection type attack or not can be verified, so that the prevention capability of the data encryption standard coprocessor on the injection type attack is improved.

Description

technical field [0001] The invention relates to the technical field of single-chip microcomputers, in particular to a data encryption standard coprocessor anti-injection attack method. Background technique [0002] Data Encryption Standard (Data Encryption Standard, abbreviation: DES) coprocessor has been widely used in secure computing single-chip microcomputers, and is mainly used to improve the ability of data encryption of single-chip microcomputers. The purpose of the injection attack on the coprocessor is to destroy the data encryption function of the single-chip microcomputer to which it belongs, and cause the upper-layer application execution error of the single-chip microcomputer. The existing injection attack methods have the following aspects: the injection attack on encrypted data disrupts the encryption result by destroying the data to be encrypted; the injection attack on the encryption key disrupts its encryption by destroying the encryption key. The purpose ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/72H04L9/06H04L9/00
CPCG06F21/72H04L9/002H04L9/0625
Inventor 李立范振伟焦英华
Owner 兆讯恒达科技股份有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More