CN110135187A - A kind of file encryption-decryption system and encipher-decipher method based on PUF - Google Patents

A kind of file encryption-decryption system and encipher-decipher method based on PUF Download PDF

Info

Publication number
CN110135187A
CN110135187A CN201910306449.3A CN201910306449A CN110135187A CN 110135187 A CN110135187 A CN 110135187A CN 201910306449 A CN201910306449 A CN 201910306449A CN 110135187 A CN110135187 A CN 110135187A
Authority
CN
China
Prior art keywords
encryption
decryption
file
module
microcontroller
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910306449.3A
Other languages
Chinese (zh)
Inventor
张景龙
熊晓明
陆江城
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong University of Technology
Original Assignee
Guangdong University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong University of Technology filed Critical Guangdong University of Technology
Priority to CN201910306449.3A priority Critical patent/CN110135187A/en
Publication of CN110135187A publication Critical patent/CN110135187A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The file encryption-decryption system based on PUF that the invention discloses a kind of, including encryption and decryption slave computer and PC host computer, the encryption and decryption slave computer includes physics unclonable function module, microcontroller, encryption/decryption module and communication module, the PC host computer includes microcomputer, control module, the microcomputer is stored with to encryption and decryption file, wherein: password being arranged by the control module and triggers excitation physics unclonable function module, physics unclonable function module carries out operation and generates the unique ID of hardware and be sent into microcontroller storage;It is described to be sent to the microcontroller to encryption and decryption file and store;By the unique ID of hardware and encryption/decryption module is sent to encryption and decryption file carrying out encryption and decryption, for the unique ID of the hardware as key, the file after encryption and decryption is simultaneously transmitted back to PC host computer by file after obtaining encryption and decryption.The unlimited file format of the present invention, encryption/decryption speed is fast, and use process is easy.

Description

A kind of file encryption-decryption system and encipher-decipher method based on PUF
Technical field
The present invention relates to computer safety fields, more particularly, to a kind of file encryption-decryption system based on PUF and add Decryption method.
Background technique
There are two types of currently a popular file encrypting methods: one is the encryption functions by software itself to carry out to file Encryption, such as the softwares such as Word, Excel, Adobe, Access, WPS all carrying encryption functions.This cipher mode is easy behaviour Make, is currently used file encryption mode, but the disadvantage is that division format file can only be encrypted.Second is to pass through The encryption function of specific software encrypts file, if WinZip, WinRaR and script software encrypt file, this The enciphering rate of kind cipher mode is obviously relatively slow, and use process is more troublesome.
With the rapid development of modem computer systems, information attack means even more complex and intelligence, conventional security are protected Maintaining method is insufficiently resistant to advanced attack tool and threatens private data message file bring, is based purely on the peace of system software Full strategy can not comprehensively protect the safety of private information file.
Summary of the invention
The present invention is directed to solve above-mentioned technical problem at least to a certain extent.
Primary and foremost purpose of the invention is to provide a kind of file encryption system based on PUF, guarantees that file transmission is safe and hidden Private protection.
The further object of the present invention is a kind of encryption method of file encryption system based on PUF.
Third object of the present invention is a kind of decryption method of file encryption system based on PUF.
In order to solve the above technical problems, technical scheme is as follows:
A kind of file encryption-decryption system based on PUF, including encryption and decryption slave computer and PC host computer, the encryption and decryption are the next Machine includes physics unclonable function module (PUF module), microcontroller, encryption/decryption module and communication module, the PC upper Machine includes microcomputer, control module, and the microcomputer is stored with to encryption and decryption file, in which:
The encryption and decryption slave computer is powered by the PC host computer, and the encryption and decryption slave computer powers on rear automatic running;
Password is set by the control module, which is that the triggering of physics unclonable function module motivates, physics Operation is carried out after the triggering of unclonable function module and generates the unique ID of hardware, and the unique ID of the hardware is sent into microcontroller and is deposited Storage;
It is described that the microcontroller is sent to by communication module to encryption and decryption file and is stored;
The microcontroller is sent to encryption/decryption module progress encryption and decryption by the unique ID of hardware and to encryption and decryption file, described Key of the unique ID of hardware as encryption/decryption module, the file after encryption and decryption is simultaneously back to micro- by file after obtaining encryption and decryption Controller, and PC host computer is transmitted back to by communication module;
In above scheme, physics unclonable function module, i.e. PUF module, due to inevitable in the fabrication process Physical difference causes each physics unclonable function module arithmetic result not identical and unique, and the program ensures file security The uniqueness of the encryption and decryption key of system, enable the system encryption file and be only capable of on identical hardware device be decrypted Come, while ensuring that encryption file is stolen in PC host computer can not all be decrypted just original document.
Preferably, the physics unclonable function module includes delay path and the arbitration that is set to after delay path Device, the input of delay path are the skip signal automatically generated after encryption and decryption slave computer powers on, and skip signal is in delay path Transmission controlled by control signal preset in microcontroller, moderator receives skip signal after delay path, and output is hard The unique ID of part.
Preferably, the delay path includes n node, and each node includes the multiple selector of two alternatives.
Preferably, the n control signals, one of control signal one node of corresponding control, same node are shared The multiple selector of two alternatives share a control signal, when the corresponding control signal of the node is high level, this Two alternatives for exporting direct parallel transmission to the node of the multiple selector of two alternatives of a upper node for node Multiple selector output.
Preferably, the moderator receives the output of the multiple selector of two alternatives of the last one node, and defeated The unique ID of n hardware out.
Preferably, the encryption/decryption module carries out encryption and decryption using international cryptography algorithm AES.
Preferably, the communication module is RS232 communication module.
A kind of encryption method of the file encryption-decryption system according to above-mentioned based on PUF, comprising the following steps:
S10: password is arranged by control module in initialization encryption and decryption slave computer;
S20: it is transmitted after being compressed to original document and by communication module to encryption and decryption slave computer, original document is deposited Storage is in the microcontroller;
S30: physics unclonable function module generates the unique ID of hardware and is transmitted to microcontroller simultaneously as encryption key Storage;
S40: reading original document and encryption key is transmitted to encryption/decryption module and carries out cryptographic calculation, obtains encryption file;
S50: it after encryption file returns to microcontroller, is transmitted by communication module to PC host computer;
S60: encryption file is stored in PC host computer.
A kind of decryption method of the file encryption-decryption system according to above-mentioned based on PUF, comprising the following steps:
S01: password is arranged by control module in initialization encryption and decryption slave computer;
S02: it is transmitted after being compressed to encryption file and by communication module to encryption and decryption slave computer, encryption file is deposited Storage is in the microcontroller;
S03: physics unclonable function module generates the unique ID of hardware and is transmitted to microcontroller simultaneously as decruption key Storage;
S04: reading encryption file and decruption key is transmitted to encryption/decryption module and operation is decrypted, and obtains original document;
S05: it after original document returns to microcontroller, is transmitted by communication module to PC host computer;
S06: original document is stored in PC host computer.
Compared with prior art, the beneficial effect of technical solution of the present invention is:
The present invention provides a kind of file encryption-decryption system and encipher-decipher method based on PUF, which can not by physics It clones function module and generates the unique unique ID of hardware and be used as key, using having used international cryptography algorithm AES progress encryption and decryption Encryption/decryption module encryption and decryption is carried out to original, file after encryption and decryption is returned on PC finally by RS232 communication module Position machine storage, the unlimited file format of the encrypting and deciphering system, encryption/decryption speed is fast, and use process is easy.
Detailed description of the invention
Fig. 1 is a kind of file encryption-decryption system structure diagram based on PUF.
Fig. 2 is the structural schematic diagram of physics unclonable function module.
Fig. 3 is a kind of file encryption-decryption system encrypted method flow diagram based on PUF.
Fig. 4 is a kind of file encryption-decryption system decryption method flow diagram based on PUF.
Specific embodiment
The attached figures are only used for illustrative purposes and cannot be understood as limitating the patent;
In order to better illustrate this embodiment, the certain components of attached drawing have omission, zoom in or out, and do not represent actual product Size;
To those skilled in the art, it is to be understood that certain known features and its explanation, which may be omitted, in attached drawing 's.
The following further describes the technical solution of the present invention with reference to the accompanying drawings and examples.
Embodiment 1
The file encryption-decryption system based on PUF that the present embodiment provides a kind of, on such as Fig. 1, including encryption and decryption slave computer and PC Position machine, the encryption and decryption slave computer includes physics unclonable function module, microcontroller, encryption/decryption module and communication module, The PC host computer includes microcomputer, control module, and the microcomputer is stored with to encryption and decryption file, in which:
The encryption and decryption slave computer is powered by the PC host computer, and the encryption and decryption slave computer powers on rear automatic running;
Password is set by the control module, which is that the triggering of physics unclonable function module motivates, physics Operation is carried out after the triggering of unclonable function module and generates the unique ID of hardware, and the unique ID of the hardware is sent into microcontroller and is deposited Storage;
It is described that the microcontroller is sent to by communication module to encryption and decryption file and is stored;
The microcontroller is sent to encryption/decryption module progress encryption and decryption by the unique ID of hardware and to encryption and decryption file, described Key of the unique ID of hardware as encryption/decryption module, the file after encryption and decryption is simultaneously back to micro- by file after obtaining encryption and decryption Controller, and the storage of the microcomputer in PC host computer is transmitted back to by communication module;
Such as Fig. 2, the physics unclonable function module includes delay path and the moderator that is set to after delay path, The input of delay path is the skip signal automatically generated after encryption and decryption slave computer powers on, biography of the skip signal in delay path Defeated to be controlled by control signal preset in microcontroller, moderator receives the skip signal after delay path, and output hardware is only One ID.The delay path includes n node, and each node includes the multiple selector of two alternatives.The shared n controls Signal processed, one of control signal one node of corresponding control, the multiple selector of two alternatives of same node share One control signal, when the corresponding control signal of the node is high level, two alternatives of a upper node for the node The output of the multiple selector of two alternative of the direct parallel transmission of output of multiple selector to the node.The moderator The unique ID of hardware for receiving the output of the multiple selector of two alternatives of the last one node, and exporting n.
The encryption/decryption module carries out encryption and decryption using international cryptography algorithm AES.
The communication module is RS232 communication module.
In the specific implementation process, the encryption method of the file encryption-decryption system according to above-mentioned based on PUF, such as Fig. 3, packet Include following steps:
S10: password is arranged by control module in initialization encryption and decryption slave computer;
S20: it is transmitted after being compressed to original document and by communication module to encryption and decryption slave computer, original document is deposited Storage is in the microcontroller;
S30: physics unclonable function module generates the unique ID of hardware and is transmitted to microcontroller simultaneously as encryption key Storage;
S40: reading original document and encryption key is transmitted to encryption/decryption module and carries out cryptographic calculation, obtains encryption file;
S50: it after encryption file returns to microcontroller, is transmitted by communication module to PC host computer;
S60: encryption file is stored in PC host computer.
According to the decryption method of the above-mentioned file encryption-decryption system based on PUF, such as Fig. 4, comprising the following steps:
S01: password is arranged by control module in initialization encryption and decryption slave computer;
S02: it is transmitted after being compressed to encryption file and by communication module to encryption and decryption slave computer, encryption file is deposited Storage is in the microcontroller;
S03: physics unclonable function module generates the unique ID of hardware and is transmitted to microcontroller simultaneously as decruption key Storage;
S04: reading encryption file and decruption key is transmitted to AES encryption/decryption module and operation is decrypted, and obtains original text Part;
S05: it after original document returns to microcontroller, is transmitted by communication module to PC host computer;
S06: original document is stored in PC host computer.
The same or similar label correspond to the same or similar components;
The terms describing the positional relationship in the drawings are only for illustration, should not be understood as the limitation to this patent;
Obviously, the above embodiment of the present invention be only to clearly illustrate example of the present invention, and not be pair The restriction of embodiments of the present invention.For those of ordinary skill in the art, may be used also on the basis of the above description To make other variations or changes in different ways.There is no necessity and possibility to exhaust all the enbodiments.It is all this Made any modifications, equivalent replacements, and improvements etc., should be included in the claims in the present invention within the spirit and principle of invention Protection scope within.

Claims (9)

1. a kind of file encryption-decryption system based on PUF, which is characterized in that described including encryption and decryption slave computer and PC host computer Encryption and decryption slave computer includes physics unclonable function module, microcontroller, encryption/decryption module and communication module, and the PC is upper Machine includes microcomputer, control module, and the microcomputer is stored with to encryption and decryption file, in which:
The encryption and decryption slave computer is powered by the PC host computer, and the encryption and decryption slave computer powers on rear automatic running;
Password is set by the control module, which is that the triggering of physics unclonable function module motivates, and physics can not The operation generation unique ID of hardware is carried out after cloning function module triggering, the unique ID of the hardware is sent into microcontroller and is stored;
It is described that the microcontroller is sent to by communication module to encryption and decryption file and is stored;
The microcontroller is sent to encryption/decryption module progress encryption and decryption by the unique ID of hardware and to encryption and decryption file, and described is hard File after encryption and decryption is simultaneously back to microcontroller by key of the unique ID of part as encryption/decryption module, file after obtaining encryption and decryption Device, and the storage of the microcomputer in PC host computer is transmitted back to by communication module.
2. the file encryption-decryption system according to claim 1 based on PUF, which is characterized in that the physics is unclonable Function module includes delay path and the moderator that is set to after delay path, and the input of delay path is on encryption and decryption slave computer The skip signal automatically generated after electricity, transmission of the skip signal in delay path is by control signal control preset in microcontroller System, moderator receive the skip signal after delay path, the unique ID of output hardware.
3. the file encryption-decryption system according to claim 2 based on PUF, which is characterized in that the delay path includes n A node, each node include the multiple selector of two alternatives.
4. the file encryption-decryption system according to claim 3 based on PUF, which is characterized in that the shared n control letters Number, one of control signal one node of corresponding control, the multiple selector of two alternatives of same node shares one Signal is controlled, when the corresponding control signal of the node is high level, the multichannel of two alternatives of a upper node for the node The output of the multiple selector of two alternative of the direct parallel transmission of output of selector to the node.
5. the file encryption-decryption system according to claim 4 based on PUF, which is characterized in that the moderator receives most The output of the multiple selector of two alternatives of the latter node, and the unique ID of hardware for exporting n.
6. the file encryption-decryption system according to claim 5 based on PUF, which is characterized in that the encryption/decryption module makes Encryption and decryption is carried out with international cryptography algorithm AES.
7. the file encryption-decryption system according to claim 6 based on PUF, which is characterized in that the communication module is RS232 communication module.
8. a kind of file encrypting method, the encryption method is based on its feature of file encryption-decryption system described in claim 1 and exists In, comprising the following steps:
S10: password is arranged by control module in initialization encryption and decryption slave computer;
S20: it is transmitted after being compressed to original document and by communication module to encryption and decryption slave computer, original document is stored in In microcontroller;
S30: physics unclonable function module generates the unique ID of hardware and is transmitted to microcontroller as encryption key and stores;
S40: reading original document and encryption key is transmitted to encryption/decryption module and carries out cryptographic calculation, obtains encryption file;
S50: it after encryption file returns to microcontroller, is transmitted by communication module to PC host computer;
S60: encryption file is stored in PC host computer.
9. a kind of file decryption method, the decryption method is based on file encryption-decryption system described in claim 1, and feature exists In, comprising the following steps:
S01: password is arranged by control module in initialization encryption and decryption slave computer;
S02: it is transmitted after being compressed to encryption file and by communication module to encryption and decryption slave computer, encryption file is stored in In microcontroller;
S03: physics unclonable function module generates the unique ID of hardware and is transmitted to microcontroller as decruption key and stores;
S04: reading encryption file and decruption key is transmitted to encryption/decryption module and operation is decrypted, and obtains original document;
S05: it after original document returns to microcontroller, is transmitted by communication module to PC host computer;
S06: original document is stored in PC host computer.
CN201910306449.3A 2019-04-16 2019-04-16 A kind of file encryption-decryption system and encipher-decipher method based on PUF Pending CN110135187A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910306449.3A CN110135187A (en) 2019-04-16 2019-04-16 A kind of file encryption-decryption system and encipher-decipher method based on PUF

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910306449.3A CN110135187A (en) 2019-04-16 2019-04-16 A kind of file encryption-decryption system and encipher-decipher method based on PUF

Publications (1)

Publication Number Publication Date
CN110135187A true CN110135187A (en) 2019-08-16

Family

ID=67570055

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910306449.3A Pending CN110135187A (en) 2019-04-16 2019-04-16 A kind of file encryption-decryption system and encipher-decipher method based on PUF

Country Status (1)

Country Link
CN (1) CN110135187A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114584297A (en) * 2022-03-01 2022-06-03 广东工业大学 Encryption and decryption system and encryption and decryption method based on physical unclonable technology

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013107593A1 (en) * 2012-01-16 2013-07-25 Gemalto Sa Electronic device generating an identifier based on physical unclonable functions
US20140189890A1 (en) * 2012-12-28 2014-07-03 Patrick Koeberl Device authentication using a physically unclonable functions based key generation system
CN208539929U (en) * 2018-06-12 2019-02-22 广东工业大学 A kind of cloud platform client data encrypting and deciphering system based on national secret algorithm

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013107593A1 (en) * 2012-01-16 2013-07-25 Gemalto Sa Electronic device generating an identifier based on physical unclonable functions
US20140189890A1 (en) * 2012-12-28 2014-07-03 Patrick Koeberl Device authentication using a physically unclonable functions based key generation system
CN104838385A (en) * 2012-12-28 2015-08-12 英特尔公司 Device authentication using physically unclonable function based key generation system
CN208539929U (en) * 2018-06-12 2019-02-22 广东工业大学 A kind of cloud platform client data encrypting and deciphering system based on national secret algorithm

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114584297A (en) * 2022-03-01 2022-06-03 广东工业大学 Encryption and decryption system and encryption and decryption method based on physical unclonable technology
CN114584297B (en) * 2022-03-01 2024-02-27 广东工业大学 Encryption and decryption system and encryption and decryption method based on physical unclonable technology

Similar Documents

Publication Publication Date Title
CN111541725B (en) Block chain all-in-one machine, password acceleration card thereof, and key management method and device
CN101401105B (en) Encryption apparatus and method for providing an encrypted file system
CN107453880B (en) Cloud data secure storage method and system
CN102185694A (en) Electronic file encrypting method and system based on fingerprint information
CN104253694A (en) Encrypting method for network data transmission
CN110650010A (en) Method, device and equipment for generating and using private key in asymmetric key
CN103378971A (en) Data encryption system and method
CN103580855A (en) Usbkey management plan based on sharing technology
CN103152322A (en) Method of data encryption protection and system thereof
CN104270242A (en) Encryption and decryption device used for network data encryption transmission
JP2019068413A (en) Method and system fo transferring data safely
CN104866784A (en) BIOS encryption-based safety hard disk, and data encryption and decryption method
TWI597960B (en) Key splitting
CN113408017A (en) Method, device, equipment and storage medium for protecting data in OTP (one time programmable) memory
EP3292654B1 (en) A security approach for storing credentials for offline use and copy-protected vault content in devices
CN112257121A (en) Encryption method, decryption method, electronic device, and storage medium
CN113326518B (en) Data processing method and device
CN110135187A (en) A kind of file encryption-decryption system and encipher-decipher method based on PUF
EP3556046B1 (en) Method for secure management of secrets in a hierarchical multi-tenant environment
Karthik et al. Hybrid cryptographic technique using OTP: RSA
CN110750326A (en) Disk encryption and decryption method and system for virtual machine
CN112149166B (en) Unconventional password protection method and intelligent bank machine
Smid Integrating the Data Encryption Standard into computer networks
CN114329390A (en) Financial institution database access password protection method and system
GB2579884A (en) Methods and systems of securely transferring data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190816

RJ01 Rejection of invention patent application after publication