Encryption system and implementation method thereof

An encryption system, encryption and decryption module technology, applied in the field of information security, can solve the problems of single key, the security of key transmission cannot be guaranteed, and the key is easy to be stolen and tampered with, so as to achieve the effect of ensuring security.

Pending Publication Date: 2020-09-29
SUN YAT SEN UNIV
View PDF9 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the key generated by this encryption protection device and method is relatively single, and the key has the risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption system and implementation method thereof
  • Encryption system and implementation method thereof
  • Encryption system and implementation method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The idea, specific structure and technical effects of the present invention will be clearly and completely described below in conjunction with the embodiments and accompanying drawings, so as to fully understand the purpose, scheme and effect of the present invention.

[0048] It should be noted that, unless otherwise specified, when a feature is called "fixed" or "connected" to another feature, it can be directly fixed and connected to another feature, or indirectly fixed and connected to another feature. on a feature. In addition, descriptions such as up, down, left, and right used in the present disclosure are only relative to the mutual positional relationship of the components of the present disclosure in the drawings. As used in this disclosure, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. Also, unless defined otherwise, all technical and scientific terms used herein have...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encryption system and an implementation method thereof, and the system comprises a true random number generator module which is used for generating a configuration signal, an excitation signal and a random plaintext; a response generation module which is used for generating a response value according to the excitation signal and the configuration signal, and the responsemodule has reconfigurability; a key generation module which is used for generating a key according to the response value; an ECC encryption and decryption module which is used for encrypting the secret key; and an SM4 encryption and decryption module which is used for encrypting the to-be-encrypted data according to the key to obtain a ciphertext. According to the system, the random response value is generated through the response generation module, so that the random key generated according to the random response value has unpredictability, and the random key is encrypted through the ECC encryption and decryption module, so that the security of the encrypted random key in the transmission process is ensured. The system can be widely applied to the technical field of encryption.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an encryption system and its implementation method. Background technique [0002] The hardware circuits and software systems of embedded systems are always facing the danger of being copied, plagiarized, and copycat by counterfeit manufacturers. In the process of information transmission, they often face the risk of information being stolen, impersonated, and tampered with. These information security risks undoubtedly bring huge threats to the normal functioning of the market economy. [0003] The existing encryption protection device and method for embedded systems generally generate a key for encryption in advance, and then store the key for encryption in the hardware memory. When the hardware needs to transmit information data, it will use The encrypted key is read from the memory, and the encryption algorithm program is executed in the processor in the electroni...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F7/58G06F21/60
CPCG06F7/588G06F21/602G06F21/606G06F2221/2107
Inventor 陈弟虎曾奋元
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products