Unlock instant, AI-driven research and patent intelligence for your innovation.

Cryptographic operation method, system-on-chip and computer equipment

A technology of computer equipment and system-on-chip, applied in the field of data processing, can solve the problems of low security strength of RSA algorithm and inability to meet encryption requirements, and achieve the effect of improving security

Active Publication Date: 2022-01-14
PHYTIUM TECH CO LTD
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, due to the relatively simple mathematical principle of the RSA algorithm, the security strength of the RSA algorithm is relatively low.
Therefore, the existing RSA algorithm can no longer meet the current encryption needs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cryptographic operation method, system-on-chip and computer equipment
  • Cryptographic operation method, system-on-chip and computer equipment
  • Cryptographic operation method, system-on-chip and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments are part of the present application Examples, not all examples. The components of the embodiments of the application generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations.

[0062] Accordingly, the following detailed description of the embodiments of the application provided in the accompanying drawings is not intended to limit the scope of the claimed application, but merely represents selected embodiments of the application. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a password operation method, a system-on-chip and computer equipment, and relates to the technical field of data processing. The method can be applied to the computer equipment, the computer equipment runs an operating system, and the operating system is used for distributing various types of software interfaces. The computer equipment is provided with a system-on-chip, the system-on-chip comprises a control unit and a cryptographic engine unit, the cryptographic engine unit is provided with a national cryptographic algorithm, and the method comprises the following steps: the control unit receives a cryptographic operation request; the control unit responds to the cryptographic operation request and indicates the cryptographic engine unit to execute a national cryptographic algorithm needing to be executed by the cryptographic operation request; when the cryptographic engine unit executes the national cryptographic algorithm, various types of software interfaces are called to execute a function matching the national cryptographic algorithm, so that the cryptographic operation method provided by the invention can be suitable for the national cryptographic algorithm which needs various types of software interfaces and is relatively high in security degree, and the security can be improved when the to-be-encrypted content is encrypted.

Description

technical field [0001] The present application relates to the technical field of data processing, in particular to a cryptographic operation method, a system on a chip and computer equipment. Background technique [0002] The RSA public key encryption algorithm was proposed in 1977 by Ronald Rivest, Adi Shamir and Leonard Adleman. RSA takes its name from all three of them. The principle of the RSA public-key cryptosystem is: According to number theory, it is relatively simple to find two large prime numbers, but it is extremely difficult to factorize their product, so the product can be publicly used as an encryption key. [0003] Currently, when encryption algorithms are deployed in various operating systems, they are mainly implemented based on the RSA encryption algorithm. [0004] However, due to the relatively simple mathematical principle of the RSA algorithm, the security strength of the RSA algorithm is relatively low. Therefore, the existing RSA algorithm cannot ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/45H04L9/08G06F15/78
CPCG06F21/45H04L9/0894G06F15/7807
Inventor 李文祥旷小红谢鹏黄全行邓强刘涛
Owner PHYTIUM TECH CO LTD