Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mimicry security password calculation model

A computing model and cryptographic algorithm technology, which is applied to public keys for secure communications, secure communications devices, and key distribution, can solve problems such as the inability to provide a hardware environment and the inability to guarantee the security of cryptographic computations

Pending Publication Date: 2021-11-09
成都天瑞芯安科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in some application scenarios such as cloud computing, due to computing resource virtualization and dynamic configuration requirements, it is impossible to provide a fixed, independent and isolated hardware environment, resulting in the security of cryptographic calculations in such application scenarios cannot be guaranteed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mimicry security password calculation model
  • Mimicry security password calculation model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The implementation system of the present invention will be described below in conjunction with the accompanying drawings.

[0018] figure 2 It is the realization system diagram of the present invention. The figure includes U-shield E1, cryptographic module E2 and application APP in the cloud environment.

[0019] pre-configured

[0020] A1: The SM2 cryptographic algorithm is implemented on the hardware of the USB-shield E1, which has the private key a and the public key Pa. The USB-shield E1 is inserted into the user's local PC and deployed in the user's controlled environment. The cryptographic module E2 is a piece of software that implements the SM2 cryptographic algorithm and has a private key b and a public key Pb. E2 runs in a public cloud environment. The application APP is a background program, including E2, running in the public cloud environment. It can be seen from the above that U-shield E1 is a proprietary hardware, and the encryption module E2 is softw...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a mimicry security password calculation model. The model is composed of two independent cryptographic calculation assemblies E1 and E2, and each assembly comprises an M1 cryptographic algorithm module, an M2 result verification module and an M3 interface. The E1 and the E2 have the same function but are different from each other; M1 of the two parties uses an asymmetric cryptographic algorithm, a collaborative cryptographic calculation mechanism is provided, and each calculation is randomized; the calculation results of M1 of the two parties are mutually input into M2 for multi-mode verification and then output to M3; and the M3 of the two parties receives calling and outputs a result. During password calculation, firstly, calling is synchronously initiated to M3 of two parties to start calculation; secondly, the M1 of the two parties performs cooperative calculation and obtains calculation results respectively, and the calculation results are mutually input to respective M2; thirdly, the M2 of the two parties performs multi-mode verification on the two paths of input calculation results, and the verified output value and the calculation result of each M1 are output to the M3 after being subjected to exclusive or operation; and finally, the M3 of the two parties outputs a final calculation result. The composition and the working mechanism of the whole model accord with the mimicry safety theory.

Description

technical field [0001] The present invention relates to the field of cryptographic calculations, especially the field of cryptographic calculations that can resist attacks, including but not limited to this field. Background technique [0002] Cryptographic calculation is a calculation that uses cryptographic algorithms to achieve a certain security goal. Basic cryptographic calculations include encryption, decryption, signature, signature verification, and integrity check code. In an information system, at least a key, an algorithm module, and an input and output interface are required to complete cryptographic calculations. In order to ensure the security of cryptographic calculations, the usual protection method is to construct a physically independent and isolated security environment, such as U-shield, TEE, etc., and encapsulate the key, algorithm, and interface into the security environment, and the security environment receives call input , output the password calcul...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/30
CPCH04L9/0869H04L9/0877H04L9/0825H04L9/0863H04L9/3066
Inventor 尚望兰天
Owner 成都天瑞芯安科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products