Time-based one-time password method and system suitable for PLC
A one-time, password technology, applied in the field of information security, can solve problems such as program slowness, achieve the effects of enhancing security, speeding up speed and reliability, and reducing memory usage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0015] The inventor found that because Intel's CPU integrates the AES instruction set, the PHOTON and SPONGENT hash algorithms based on AES optimization have higher efficiency on the PC, but there is no AES instruction set on the PLC, so the light-weight hash algorithms such as PHOTON and SPONGENT Level cipher algorithm is less efficient to run on PLC. In Table 1, the performance of the hash algorithm and the block encryption algorithm is summarized, and the reason why the time-based one-time password will be inefficient if it is based on the hash is explained. By comparing the number of atomic operations: 256 / 32 / 32 version The PHOTON hash algorithm mainly performs 100,000 assignments, 20,000 additions, and 15,000 XORs. The 256 / 256 / 128 version of the SPONGENT hash algorithm mainly performs 420,000 assignments, 3,000 additions, and 6,000 XORs. , while the PRESENT block encryption algorithm that satisfies 128-bit security mainly performs 5,000 assignments and 60 XORs, and the ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com