Time-based one-time password method and system suitable for PLC
A one-time, password technology, applied in the field of information security, can solve problems such as program slowness, achieve the effects of enhancing security, speeding up speed and reliability, and reducing memory usage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Example Embodiment
[0015] The inventor found that because Intel’s CPU integrates the AES instruction set, the PHOTON and SPONGENT hashing algorithms optimized based on AES are more efficient on the PC, but there is no AES instruction set on the PLC, so the PHOTON and SPONGENT hashing algorithms are lightweight The level of password algorithm runs inefficiently on PLC. In Table 1, the performance of the hash algorithm and the block encryption algorithm are summarized, and the reason why the time-based one-time password is inefficient if based on the hash is obtained by comparing the number of atomic operations: 256 / 32 / 32 The PHOTON hash algorithm mainly does 100,000 assignments, 20,000 additions, and 15,000 XORs. The 256 / 256 / 128 version of the SPONGENT hash algorithm mainly does 420,000 assignments, 3,000 additions, and 6,000 XORs. , And the PRESENT block encryption algorithm that meets 128-bit security mainly does 5,000 assignments, 60 XORs, and the SPECK block encryption algorithm mainly does 3...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap