Key exchange acceleration method for establishing trusted execution environment security level

An execution environment and key exchange technology, which is applied to public keys for secure communication, secure communication devices, and key distribution, can solve the problems of slow public key exchange, high CPU overhead, and insufficient timeliness, and achieve fast one-to-many , to achieve the effect of flow control and avoid leakage

Pending Publication Date: 2022-07-29
NANJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to ensure the establishment of TEE (Trusted Execution Environment) level key exchange in the existing traditional public key distribution technology, the key management module is designed in the trusted execution environment, and the port communication between the rich environment and the trusted execution environment is used. To complete the ECDH process, such as figure 1 As shown, when the communication was established, REE (Rich Environment) and TEE (Trusted Execution Environment) communicated 5 times, and the key management modules of both parties generated public-private key pairs and calculated the session keys of both parties. SK, a total of 4 real-time calculations, which lead to the real-time generation of public and private keys in ECDH, resulting in huge CPU overhead, and too many interactions between the rich environment and the trusted execution environment, which greatly reduces the amount of CPU real-time calculations. The public key exchange between the two parties in the communication is slow and not timely enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key exchange acceleration method for establishing trusted execution environment security level
  • Key exchange acceleration method for establishing trusted execution environment security level

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The technical solutions of the present invention will be further described in detail below with reference to the accompanying drawings.

[0025] compared to figure 1 The traditional method process, the exchange process provided by this embodiment is as follows figure 2 As shown, the specific work consists of two parts, and the process is as follows:

[0026] (1), the key generation part

[0027] The key management module is connected to the public key storage pool, and writes the generated key into the public key storage pool. Each key corresponds to a unique key number, corresponding to its specific location in a public key storage pool. The key generation frequency can be flexibly set according to needs, and can be switched on demand, which can meet the needs of high-speed public key distribution, and the decryption terminal can quickly query the private key according to the number for decryption.

[0028] The public key storage pool module is connected to the key...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A key exchange acceleration method for establishing a trusted execution environment security level comprises a key management module, a public key storage pool and a key monitoring module, and the key management module is used for generating a key required by communication and managing and calculating a session key. The public key storage pool module is established in a rich environment REE, and the key monitoring module is used for controlling the key generation speed and making mode selection. By calculating the relationship between the key use speed and the key storage capacity and adaptively selecting the key generation mode, the use of the key is not influenced by the communication performance, the generation operation can be carried out at the optimal speed, the communication speed is greatly improved, and the key generation becomes the bottleneck problem influencing the communication time.

Description

technical field [0001] The invention belongs to the technical field of computer and information security, and relates to a method capable of establishing TEE-level key exchange and accelerating key distribution and exchange. Background technique [0002] With the rapid development of cloud computing technology and Internet of Things technology, people are gradually moving towards an intelligent world where everything is connected. The number of applications that have strong requirements for data privacy protection, such as Internet finance and mobile payment, has shown an explosive growth, which poses severe challenges to cryptographic algorithms, especially public key cryptographic algorithms with high computational complexity. On the service side represented by cloud computing technology, it needs to face the massive data generated by hundreds of millions of users, and the server side needs to complete the identity authentication and data protection of these users within a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/40H04L9/08H04L9/32
CPCH04L9/30H04L63/061H04L9/0894H04L9/3268H04L9/3247H04L9/0891
Inventor 向奕儒张伟董建阔陈云芳
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products