Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

123 results about "SM4 Algorithm" patented technology

SM4 (formerly SMS4) is a block cipher used in the Chinese National Standard for Wireless LAN WAPI (Wired Authentication and Privacy Infrastructure). SM4 was a cipher proposed to for the IEEE 802.11i standard, but has so far been rejected by ISO. One of the reasons for the rejection has been opposition to the WAPI fast-track proposal by the IEEE.

Trusted platform module and its computer starting control method

The invention provides a trusted platform module and a method for controlling computer starting by adopting the same. The novel trusted platform module with control function is formed by adding a starting control module into the prior trusted platform module to be combined with the prior trusted platform module. The novel trusted platform module is the first to be started when a computer is electrified and controls a starting flow so as to change the position that usually the trusted platform module is only slave equipment and ensure that the trusted platform module becomes main control equipment. The novel trusted platform module begins to work before the computer starts, provides bottom security, comprises a power supply for controlling a CPU of the computer and a data bus between the CPU of the computer and a storage of the computer, and performs integrity verification on a starting component of the computer. The trusted platform module and the method also use hardware to realize SMS4 symmetric cryptographic algorithm and remedy the advantages of the prior trusted platform module. The trusted platform module can fully control the starting flow of the computer, and has the advantages of high security, quick encryption/decryption operation, reliable operation and the like.
Owner:WUHAN UNIV

Gait bio-feature based mobile device identity recognition method

The invention provides a gait bio-feature based mobile device identity recognition method. The method is combined with a mobile terminal and is perfection and expansion of an existing bio-identification technology. The method consists of two parts of a training module and an identification module. The training module comprises three steps of data acquisition, feature extraction and model establishment; and the identification module comprises to-be-identified user data collection, model matching and notification response. According to the method, by utilizing self functions and convenience of the mobile terminal, data is completely acquired, a scientific mathematic basic model is constructed, and gait information of a user is obtained, so that user uniqueness is ensured. A system adopts a national SMS4 symmetric encryption algorithm to perform encryption, so that the data transmission security is well ensured. The method has the advantages that rich sensor and network functions of the mobile device are fully utilized, a modeling process is combined with daily gaits of the user, and the bio-identification technology can be continuously perfected without the need for a deliberate operation. Compared with other identification modes, the security system is relatively high in concealing property and difficult to target. Meanwhile, no contact is required, the concealing is difficult, and remote identification can be performed, so that the user security guarantee is greatly improved.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Second-order side channel energy analysis method for SM4 algorithm of simple mask

ActiveCN103647637ABreaking new ground for attackExtended side channel energy analysis methodEncryption apparatus with shift registers/memoriesPower analysisS-box
The invention discloses a second-order side channel energy analysis method for an SM4 algorithm of a simple mask. To achieve mask protection for the SM4 algorithm with the output of four S boxes carrying the same mask value, the method comprises the steps of (1) acquiring energy traces and establishing a sampling energy consumption matrix; (2) preprocessing the energy consumption matrix in the previous step; (3) selecting attack points to conduct CPA or DPA to obtain rki, 0; (4) re-selecting an S-box operation part and following the steps (2) and (3) to obtain rki, u through analysis; and (5) carrying out the steps (2), (3) and (4) on previous/next four rounds to obtain a round key and obtaining an initial key through a key inverse expansion operation. The technical scheme of the invention innovatively provides the new second-order energy analysis method, develops a new situation of SM4 cryptographic algorithm attack, extends the side channel power analysis method for the SM4 algorithm, and can fully and effectively conducts side channel energy analysis on the SM4 cryptographic algorithm; and the method of the technical scheme is highly practical for common mask protection measures.
Owner:国家密码管理局商用密码检测中心

Secure transmission method of private cloud medical data

The invention discloses a secure transmission method of private cloud medical data. The method comprises the following steps: encrypting collected data by calling an IP core of an SM4 algorithm by an ARM through an AXI bus, performing digital signature on the encrypted data by the ARM by using an SM2 algorithm after the data are encrypted, calling the IP core of an SM3 algorithm to perform operation acceleration in the signature process, and sending the data to the cloud by using WIFI. By adoption of the secure transmission method disclosed by the invention, the following problem is solved: before the existing personal private cloud medical data need to be encrypted to ensure the security before being sent to a cloud server, however the data bandwidth required for high-precision medical data is very large, and the computing ability of the traditional software cannot satisfy the real-time encryption demand, the security of the data is guaranteed by the SM4 algorithm in the secure transmission method disclosed by the invention, the reliability of the data is guaranteed by the SM2 digital signature algorithm, and the privacy protection of the personal medical data in the transmission process is accomplished efficiently in real time by means of the parallel processing ability of hardware.
Owner:XIDIAN UNIV

Mask method and mask device for SM4 algorithm

The invention discloses a mask method and a mask device for an SM4 algorithm. The mask method comprises the following steps: acquiring an inputted masked plain text, a random mask and round keys; carrying out a first round operation of a round function on the masked plain text, the random mask and a first round key in the round keys, to obtain a first round ciphertext and a first round mask; carrying out a second round operation of the round function on the first round ciphertext, the first round mask and a second round key in the round keys, to obtain a second round ciphertext and a second round mask, so as to realize N rounds of operation of the round function in turn; and carrying out an XOR operation an N round ciphertext and an N round mask outputted from the N round operation, wherein the operation result is taken as an output of the SM4 algorithm. Namely, except for the first round operation in the N rounds of operation of the round function, masks required for each round operation are all obtained by the output of the last round operation next to the current round operation, and therefore a demask on an intermediate value of the N rounds of operation is not required by adopting the technical solution disclosed by the invention, so that a resistance to an energy attack is realized.
Owner:CHINA INFORMATION TECH SECURITY EVALUATION CENT

SM4 algorithm white box implementation method and device, electronic equipment and computer medium

The invention provides an SM4 algorithm white box implementation method and device, electronic equipment and a computer medium. The method comprises the steps of obtaining plaintext information to beencrypted; performing 32 rounds of transformation on the plaintext information to obtain an encryption result corresponding to the plaintext information, wherein each round of transformation in the 32rounds of transformation comprises the following steps: in the round of lookup table TAr, searching a first lookup result corresponding to the second round of data to be processed and the third roundof data to be processed; searching a first search result of the round and a second search result corresponding to fourth to-be-processed data of the round in the round search table TBr; searching a third search result corresponding to the second search result in the round of lookup table TCr; in the round of lookup table TDr, searching a fourth lookup result corresponding to the first round of data to be processed and the third round of lookup result, wherein r is equal to 1, 2, 3,..., 32, the lookup table TAr, the lookup table TBr, the lookup table TCr and the lookup table TDr are used for completing the rth round of operation of the SM4 algorithm, and encoding protection is carried out on an operation result; and the key has high security.
Owner:中电科网络安全科技股份有限公司

Self-adaptive key distribution mechanism based on QKD network

The invention discloses a self-adaptive key distribution mechanism based on a QKD network, and the mechanism comprises three key strategies: 1, using a classic key independently; 2, independently using a quantum key; and 3, the quantum key and the classic key are used in a fusion manner, so that the condition that the requirement on the key quantity cannot be met due to low quantum key generationrate is avoided. According to the invention, a playing type video is downloaded; Audio information, assigning a candidate packet encryption algorithm for it; AES, 3DES, IDEA, SM1, SMS4, Twofish. The method is used for an RTSP streaming video. Audio information, High real-time performance needs to be guaranteed, The method comprises the following steps: aiming at RTSP streaming video/audio information; assigning a candidate encryption algorithm for it; AES, SM1, SMS4, RC4, Rabbit, ChaCha20, The method has the advantages that the requirements on real-time performance of text information such aselectronic mails and control information are low, a symmetric encryption algorithm is distributed for the application of the type mainly according to the security level required by the application, and accordingly candidate encryption algorithms such as DES, AES, SM1, SMS4 and Twofish can be designated for the application of the type;
Owner:BEIJING INFORMATION SCI & TECH UNIV +1

Data desensitization method and device, computer equipment and storage medium

The invention relates to a data desensitization method and device, computer equipment and a storage medium. The method comprises the following steps: acquiring digital sensitive data; according to a preset segmentation rule corresponding to the digital sensitive data, performing segmentation processing on the digital sensitive data; based on a preset round operation function, performing round operation of a Feistel structure on the segmented digital sensitive data to obtain a round operation result; and acquiring ciphertext data corresponding to the digital sensitive data according to a roundoperation result. According to the data desensitization method, a round function is constructed through SM4 encryption; round operation is carried out based on a round function to carry out data desensitization; the format consistency of the digital characteristic data before and after desensitization is effectively ensured; the data length, the data type and the like are not changed, so that theoriginal database storage unit can directly store the ciphertext result, the utilization rate of the encryption result is effectively improved, meanwhile, the SM4 algorithm is expanded to a reserved format encryption algorithm, and the applicability of SM4 is enhanced.
Owner:卓尔智联(武汉)研究院有限公司

Method for establishing channel in TLS1_3 protocol based on national cryptographic algorithm

The invention discloses a method for establishing a channel in a TLS1_3 protocol based on a national cryptographic algorithm. The method comprises a key exchange stage, a server parameter stage and anidentity authentication stage. In the key exchange phase, an SM2 key exchange algorithm is introduced to negotiate a shared key, and compared with international algorithms such as ECDH and ECDSA, a safer mechanism is adopted; in the identity authentication stage, compared with an RSA algorithm, the SM2 algorithm has the advantages that the encryption strength is similar to the safety performanceof a 3072-bit RSA algorithm when the key length of the SM2 algorithm is 256 bits, two message words are used in each round of a compression function of the SM3 algorithm, and the SM3 algorithm has higher word completeness than an existing SHA256 algorithm. In a symmetric encryption algorithm, an SM4 algorithm is introduced, a 32-round nonlinear iterative structure is adopted, the number of roundsof calculation is far larger than that of an AES algorithm, and safety is higher. According to the method, by improving the encryption algorithm serving as a data transmission safety core, secret keyleakage in the transmission process is avoided, and the safety of establishing a TLS1_3 channel is improved to a great extent.
Owner:CHINA FINANCIAL CERTIFICATION AUTHORITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products