Data decryption method and device and computer readable storage medium

A data decryption and computer technology, applied in the field of information security to achieve the effect of ensuring security

Pending Publication Date: 2020-05-12
CANAAN BRIGHT SIGHT CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the problem of detecting the key of the encryption algorithm inside the chip by side-channel attacks such as differential power analysis or differential electromagnetic analysis in the above-mentioned prior art, the present invention proposes a data decryption method, device and computer-capable Read the storage medium, which can first perform a second check on the data to be decrypted to verify its integrity, and then perform a decryption operation on the data to be decrypted while ensuring the integrity of the data to be decrypted, effectively preventing the encrypted data from being The key of the encryption algorithm is deciphered by side-channel attack, which ensures the security of user data (or running data)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data decryption method and device and computer readable storage medium
  • Data decryption method and device and computer readable storage medium
  • Data decryption method and device and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Hereinafter, exemplary embodiments of the present invention will be described in detail with reference to the accompanying drawings so that those skilled in the art can easily implement them. Also, for clarity, parts not related to describing the exemplary embodiments are omitted in the drawings.

[0043] In the present invention, it should be understood that terms such as "comprising" or "having" are intended to indicate the presence of features, numbers, steps, acts, components, parts or combinations thereof disclosed in this specification, and are not intended to exclude one or a plurality of other features, numbers, steps, acts, parts, parts or combinations thereof exist or are added.

[0044] In addition, it should be noted that, in the case of no conflict, the embodiments of the present invention and the features in the embodiments can be combined with each other. The present invention will be described in detail below with reference to the accompanying drawings ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data decryption method and device, and a computer readable storage medium. The method comprises the steps of reading a first hash value from a nonvolatile memory; reading a second hash value from the one-time programmable chip; performing primary verification on the first hash value by utilizing the second hash value; if the first verification is passed, reading the to-be-decrypted data from the nonvolatile memory; calculating a third hash value of the to-be-decrypted data based on a preset hash function; performing secondary verification on the first hash value by utilizing the third hash value; and if the secondary verification is passed, decrypting the to-be-decrypted data. According to the method and the device, the to-be-decrypted data is subjected to secondary verification to verify the integrity of the to-be-decrypted data, and then the to-be-decrypted data is decrypted under the condition of ensuring the integrity of the to-be-decrypted data, so that the to-be-decrypted data is effectively prevented from being decrypted in a bypass attack mode to obtain the key of the encryption algorithm.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to a data decryption method, device and computer-readable storage medium. Background technique [0002] With the development of information security technology, portable devices with cryptographic chips as the main components are widely used. The user's data in the storage unit of the embedded device may contain algorithms with commercial value, confidential keys or digital watermarks, etc., in the SoC (System on Chip, system on chip) with OTP (One Time Programable, one-time programmable) ROM In chips, how to protect the integrity of user data is an urgent problem to be solved. [0003] In the existing solution, the encrypted user data in the storage unit is usually directly decrypted and run in the memory. If the encrypted program is wrong, the decrypted program is also wrong. However, in the above-mentioned method of directly decrypting encrypted user data, even i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/79
CPCG06F21/79
Inventor 李杨杰张楠赓
Owner CANAAN BRIGHT SIGHT CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products