Mimicry defense judgment method and system based on partial homomorphic encryption algorithm

A technology of homomorphic encryption and adjudication method, which is applied in the field of information security, can solve the problems of inconvenient and quick search of executive bodies, execution bodies cannot be completely heterogeneous, and high equipment performance requirements, so as to reduce the risk of being attacked and reduce attack sensitivity high probability and high safety effect

Active Publication Date: 2020-04-10
NANJING REDMATRIX NETWORK SECURITY TECH R & D INST
View PDF6 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If random numbers or timestamps are not introduced in the process of executive result transmission, these ruling methods are vulnerable to replay attacks in multi-mode / policy voting systems. If random numbers, timestamps, etc. are used, these solutions need to be corrected. Judgment is made after the ciphertext is decrypted. At this time, hackers or internal spies attacking the multi-mode / strategic voting system will lead to direct data leakage, and the decryption operation in the multi-mode / strategic voting module will also reduce system performance.
In addition, in practical applications, the execution body cannot be completely heterogeneous, so there will be a common mode escape phenomenon, that is, assuming that multiple isomers cannot defend against the same attack, then if one of these isomers is selected during an execution Multiple isomers, using this attack method can collapse multiple isomers at the same time
[0006] The patent document with the publication number CN 110750802 A discloses a framework for protecting key data based on mimicry defense. By dynamically scheduling encryption and decryption executives, the attack surface of the data is in a dynamic change. By using the idea of ​​redundancy and Combined with necessary data hash storage and hiding technology, etc., to improve information security, it is aimed at key data processing, with a large amount of calculation and high requirements on equipment performance, and it is not convenient to quickly find faulty execution bodies, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mimicry defense judgment method and system based on partial homomorphic encryption algorithm
  • Mimicry defense judgment method and system based on partial homomorphic encryption algorithm
  • Mimicry defense judgment method and system based on partial homomorphic encryption algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The following further clarifies the present invention with reference to the drawings and specific embodiments. It should be understood that these embodiments are only used to illustrate the present invention and not to limit the scope of the present invention.

[0033] In the mimic defense ruling system based on partial homomorphic encryption of the present invention, a homomorphic encryption module is added to the execution module, that is, a homomorphic encryption module and figure 1 The execution body in the executor is combined to form a new execution body; the strategy scheduling module only needs to add a random number generation module, and there is no need to change the hardware of the original system, which is convenient for upgrading the existing system.

[0034] The method of the present invention includes the following steps:

[0035] Step (1.1). After the task is input to the mimic defense system, the strategy scheduling module selects a certain amount of heterogen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mimicry defense judgment method and system based on a partial homomorphic encryption algorithm. In the judgment method, a random number and an encryption key are distributedfor a heterogeneous execution body, a ciphertext is outputted through an execution module, a judgment object is a ciphertext obtained through employing an agreed algorithm for an execution result, anda feedback system which is convenient to check and is good in confidentiality is arranged. The system comprises a strategy scheduling module, an execution module, a multimode and strategy voting module, an isomer set and the like, the strategy scheduling module is provided with a random number generation module, and the execution module is provided with a homomorphic encryption module. Accordingto the method and the system, replay attacks and the like on the judgment mode in the multimode / strategy voting system can be reduced or avoided, and the purposes of protecting user privacy, preventing data leakage and improving the safety and stability of the whole mimicry defense system are achieved.

Description

Technical field [0001] The invention relates to the technical field of information security, in particular to a mimic defense ruling method and system based on a partially homomorphic encryption algorithm. Background technique [0002] Partial homomorphic encryption is a cryptographic technique based on the computational complexity theory of mathematical problems. Perform arithmetic processing on the partially homomorphic encrypted data to get an output, and decrypt this output. The result is the same as the output obtained by processing the unencrypted original data with a certain operation. Partial homomorphic encryption refers to a homomorphic encryption technology that can only take partial operations or operations on plaintext and ciphertext. For example, the homomorphic addition of the ciphertext obtained after the logarithm a and b are encrypted with the same key is the same as the result obtained after the addition of a and b and then encrypted with the above key, which ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00
CPCH04L9/008
Inventor 赵海宁郁晨陈垚羊子煜王泽雨陈立全冯海生
Owner NANJING REDMATRIX NETWORK SECURITY TECH R & D INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products