CN115913565B - Method for improving communication transmission safety of encryption chip and encryption chip - Google Patents

Method for improving communication transmission safety of encryption chip and encryption chip Download PDF

Info

Publication number
CN115913565B
CN115913565B CN202211291580.5A CN202211291580A CN115913565B CN 115913565 B CN115913565 B CN 115913565B CN 202211291580 A CN202211291580 A CN 202211291580A CN 115913565 B CN115913565 B CN 115913565B
Authority
CN
China
Prior art keywords
encryption
data
encryption chip
chip data
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211291580.5A
Other languages
Chinese (zh)
Other versions
CN115913565A (en
Inventor
李果
刘惠聪
简淦杨
张佰玲
李嘉添
黄锦城
黄辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wanlv Electromechanical Equipment Operation And Maintenance Shenzhen Co ltd
CSG Electric Power Research Institute
Original Assignee
Wanlv Electromechanical Equipment Operation And Maintenance Shenzhen Co ltd
CSG Electric Power Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wanlv Electromechanical Equipment Operation And Maintenance Shenzhen Co ltd, CSG Electric Power Research Institute filed Critical Wanlv Electromechanical Equipment Operation And Maintenance Shenzhen Co ltd
Priority to CN202211291580.5A priority Critical patent/CN115913565B/en
Publication of CN115913565A publication Critical patent/CN115913565A/en
Application granted granted Critical
Publication of CN115913565B publication Critical patent/CN115913565B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The application provides a method for improving communication transmission safety of an encryption chip and the encryption chip, wherein the method comprises the following steps: the encryption module receives the first encryption chip data, and encrypts the first encryption chip data by adopting an encryption key to obtain second encryption chip data; the encryption module encrypts the encryption key under the control of the control module to obtain a key block; the communication module recognizes the identity of the target electronic component, signs the data of the first encryption chip and calculates the abstract value; and transmitting the second encryption chip data, the first encryption chip data signature, the key block and the digest value to the antenna resonance module, and transmitting the second encryption chip data, the first encryption chip data signature, the key block and the digest value to the target electronic component through the antenna. The application saves the storage space of the encryption module and ensures the safety of the data of the first encryption chip; the encryption module encrypts the encryption key to obtain a key block, so that the encryption key is prevented from being stolen; and the encryption key is encrypted for the second time, so that the security of the data of the first encryption chip is improved.

Description

Method for improving communication transmission safety of encryption chip and encryption chip
Technical Field
The present application relates to the field of electronic communications technologies, and in particular, to a method for improving communication security of an encryption chip and an encryption chip.
Background
The radio frequency refers to high-frequency alternating current variable electromagnetic waves ranging from 30OKHZ to 30 OZHZ, and the radio frequency chip architecture comprises a receiving channel and a transmitting channel. Radio frequency technology is widely used in wireless communications, and as technology continues to develop, it is increasingly important.
In the first prior art, CN201710121975.3 is a storage design method of a blockchain encryption radio frequency chip, which comprises the following steps: firstly, designing a data structure of a block chain encryption radio frequency chip; secondly, data in the block chain encryption radio frequency chip is designed to be organized and stored in a user memory; and thirdly, designing an encryption and decryption process of the block chain encryption radio frequency chip. The block chain encryption radio frequency chip storage design method improves the information safety by researching the encryption principle of the block chain, meets the principle of one card for multiple purposes, increases the information protection degree and improves the use safety and the use convenience.
In the second prior art, a frequency hopping radio station based on a Si446x integrated radio frequency chip and an R5F562N8 singlechip is structurally divided into a core board and an expansion board, and the core board and the expansion board are connected through a patch connector. The core board adopts a singlechip as a main control module to finish the functions of modulation and demodulation, encryption and decryption, frequency hopping pattern generation and the like; an integrated radio frequency chip is used as a core of a radio frequency module to finish the functions of frequency hopping, frequency de-hopping, digital-to-analog/analog conversion, frequency conversion and the like; the expansion board is mainly a power circuit and a peripheral interface, and is used for completing level conversion and data exchange with other devices. The frequency hopping radio station can be configured through an upper computer, and parameters such as the central frequency, the operation mode, the serial port baud rate, the air speed, the secret key, the ID number of the radio station and the like of the frequency hopping radio station are modified. The frequency hopping radio station can realize fixed frequency communication and frequency hopping communication according to a self-fixed protocol, and has the advantages of small volume, strong expandability, flexibility and convenience.
In the third prior art, CN202011568841.4 is based on NB-IoT security module, gas meter reading system and method, comprising: the security chip is connected with the MCU of the gas meter reading system through an AT interface, and the NB-IoT system level chip is connected with a remote server; the security chip is used for receiving the gas meter data acquired by the MCU, encrypting the gas meter data and transmitting the encrypted gas meter data to the NB-IoT radio frequency chip, and receiving the downlink data transmitted by the NB-IoT radio frequency chip, decrypting the downlink data and transmitting the decrypted downlink data to the MCU. The security chip is integrated into the security module, so that the peripheral circuit of the security chip used by the gas meter reading system is simplified, the security and confidentiality of data transmission are ensured, the security module adopts the NB-IoT radio frequency chip, and the low power consumption of the whole security module is ensured.
The first, second and third existing technologies adopt a single mode for data encryption, so that the security of the data cannot be ensured and the problem of data leakage is easy to cause.
Disclosure of Invention
In order to solve the technical problems, the application provides a method for improving the communication transmission security of an encryption chip, which comprises the following steps:
the encryption module receives the first encryption chip data, and encrypts the first encryption chip data by adopting an encryption key to obtain second encryption chip data;
the encryption module encrypts the encryption key under the control of the control module to obtain a key block; signing the first encryption chip data and calculating a digest value;
and the communication module identifies the identity of the target electronic component, and after the identity identification is successful, the second encryption chip data, the first encryption chip data signature, the key block and the abstract value are transmitted to the antenna resonance module under the control of the control module and are transmitted to the target electronic component through the antenna.
Optionally, the chip data to be encrypted is encrypted, which specifically includes:
decomposing the first encryption chip data into table names, fields and data records;
the first encryption chip data which are decomposed into table names, fields and data records are scrambled by adopting data information, so that scrambled first encryption chip data are obtained;
acquiring an initial key of an encryption module;
accumulating the scrambled first encryption chip data according to bytes, taking the accumulated first encryption chip data as characteristic values of table names, fields and data records, and taking the difference value of the characteristic values and an initial key as the difference degree of the first encryption chip data;
and encrypting the scrambled first encryption chip data by using the degree of difference as an initial parameter and adopting encryption mode diffusion to obtain second encryption chip data.
Optionally, the field further includes a field type and a field length.
Optionally, the control module transmits the information obtained by the first encryption key signcryption to the first encryption module; transmitting the information obtained by the second encryption key signcryption to a second encryption module; then transmitting the information obtained by the third encryption key signcryption to a third encryption module;
the first encryption key, the second encryption key, and the third encryption key, and the public key are formed into a key block.
Optionally, signing the first encrypted chip data and calculating a digest value, specifically including:
calculating a byte range corresponding to the signature according to the attribute information of the first encryption chip data and the digital signature algorithm;
extracting byte range data of the first encrypted chip data according to the byte range;
the digest value is calculated from the byte range data.
Optionally, attribute information of the digital signature algorithm includes: a public key and a private key of the encryption key.
Optionally, the antenna resonance module receives the second encryption chip data, the first encryption chip data signature, the key block and the abstract value, then performs pulse code modulation to obtain an analog signal, and sends the analog signal to an analog-to-digital sampling and enters an editable array logic to obtain a digital signal;
quadrature down-conversion low-pass filtering is carried out on the digital signals to obtain quadrature digital signals, and the quadrature digital signals are multiplied by the self-adaptive weight to finish interference filtering;
and outputting the digital signal after interference filtering processing, wherein the digital signal comprises the second encryption chip data, the first encryption chip data signature, the key block and the digest value.
The application provides an encryption chip, which comprises:
the rectification module is used for generating a power supply required by the encryption chip;
the frequency removing module is connected with the rectifying module in parallel and is used for generating a clock required by the encryption chip;
the control module is respectively and electrically connected with the rectification module and the frequency-dividing module and is used for controlling the working flow of the encryption chip;
the storage module is electrically connected with the control module and used for storing chip data;
the communication module is connected with the encryption module, the control module and the storage module and is used for realizing communication of the encryption chip, identifying the identity of the target electronic component, comparing the identity with the equipment characteristics stored by the storage module, and sending the encrypted encryption chip data to the antenna resonance module under the control of the control module after the identity identification is successful;
the encryption module is respectively and electrically connected with the control module and the storage module and comprises a plurality of encryption modules for encrypting the data of the encryption chip;
and the antenna resonance module is connected with the communication module and used for transmitting the encrypted chip data encrypted by the encryption module to the target electronic component through the antenna.
Optionally, the antenna resonance module is provided with an anti-interference device, so as to process interference signals in the process of sending the second encrypted chip data, the first encrypted chip data signature, the key block and the digest value to the target electronic component.
Optionally, a plurality of encryption modules are provided for encrypting the encrypted chip data.
The method comprises the steps of encrypting first encryption chip data through an encryption module; the antenna resonance module is connected with the encryption module and used for transmitting the second encryption chip data to the target electronic component through the antenna; the encryption key is adopted to encrypt the first encryption chip data to obtain second encryption chip data, so that the storage space of the encryption module is saved, and the encryption key is adopted to encrypt the first encryption chip data, so that the safety of the first encryption chip data is ensured; the encryption module encrypts the encryption key to obtain a key block, so that the encryption key is prevented from being stolen, the encryption key is encrypted for the second time on the premise of encrypting the chip data to be encrypted for the first time through the encryption key, the safety of the first encryption chip data is further improved, the safety of the encryption key is also improved, and the chip data to be encrypted is prevented from being cracked due to the loss or leakage of the encryption key; transmitting the second encryption chip data, the first encryption chip data signature and the key block to an antenna resonance module, transmitting the second encryption chip data, the first encryption chip data signature and the key block to a target electronic component through an antenna, enabling the target electronic component to decrypt the second encryption chip data through the second encryption chip data, the first encryption chip data signature and the key block, and comparing whether the digest value is the same or not through signature authentication of the first encryption chip data signature so as to confirm whether the first encryption chip data is tampered or not; the method is simple and quick, can quickly realize the encryption of the first encryption chip data, and ensures the safety of the first encryption chip data sent to the target electronic component through the antenna.
Additional features and advantages of the application will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the application. The objectives and other advantages of the application will be realized and attained by the structure particularly pointed out in the written description and claims thereof as well as the appended drawings.
The technical scheme of the application is further described in detail through the drawings and the embodiments.
Drawings
The accompanying drawings are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate the application and together with the embodiments of the application, serve to explain the application. In the drawings:
FIG. 1 is a flowchart of a method for improving communication transmission security of an encryption chip according to an embodiment of the present application;
FIG. 2 is a flowchart of encrypting chip data to be encrypted according to an embodiment of the present application;
FIG. 3 is a flow chart of a key block process in an embodiment of the application;
FIG. 4 is a flowchart of summary calculation in an embodiment of the present application;
fig. 5 is a block diagram of a crypto chip in an embodiment of the present application.
Detailed Description
The preferred embodiments of the present application will be described below with reference to the accompanying drawings, it being understood that the preferred embodiments described herein are for illustration and explanation of the present application only, and are not intended to limit the present application.
The terminology used in the embodiments of the application is for the purpose of describing particular embodiments only and is not intended to be limiting of embodiments of the application. As used in this application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any or all possible combinations of one or more of the associated listed items.
When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the application as detailed in the accompanying claims. In the description of the present application, it should be understood that the terms "first," "second," "third," and the like are used merely to distinguish between similar objects and are not necessarily used to describe a particular order or sequence, nor should they be construed to indicate or imply relative importance. The specific meaning of the above terms in the present application can be understood by those of ordinary skill in the art according to the specific circumstances.
Example 1
As shown in fig. 1, the embodiment of the application provides a method for improving the communication transmission security of an encryption chip, which comprises the following steps:
s100: the encryption module receives the first encryption chip data, and encrypts the first encryption chip data by adopting an encryption key to obtain second encryption chip data;
s200: the encryption module encrypts the encryption key under the control of the control module to obtain a key block; signing the first encryption chip data and calculating a digest value;
s300: and the communication module identifies the identity of the target electronic component, and after the identity identification is successful, the second encryption chip data, the first encryption chip data signature, the key block and the abstract value are transmitted to the antenna resonance module under the control of the control module and are transmitted to the target electronic component through the antenna.
The working principle and beneficial effects of the technical scheme are as follows: the method comprises the steps of encrypting first encryption chip data through an encryption module; the antenna resonance module is connected with the encryption module and used for transmitting the second encryption chip data to the target electronic component through the antenna; the encryption key is adopted to encrypt the first encryption chip data to obtain second encryption chip data, so that the storage space of the encryption module is saved, and the encryption key is adopted to encrypt the first encryption chip data, so that the safety of the first encryption chip data is ensured; the encryption module encrypts the encryption key to obtain a key block, so that the encryption key is prevented from being stolen, the encryption key is encrypted for the second time on the premise of encrypting the chip data to be encrypted for the first time through the encryption key, the safety of the first encryption chip data is further improved, the safety of the encryption key is also improved, and the chip data to be encrypted is prevented from being cracked due to the loss or leakage of the encryption key; transmitting the second encryption chip data, the first encryption chip data signature and the key block to an antenna resonance module, transmitting the second encryption chip data, the first encryption chip data signature and the key block to a target electronic component through an antenna, enabling the target electronic component to decrypt the second encryption chip data through the second encryption chip data, the first encryption chip data signature and the key block, and comparing whether the digest value is the same or not through signature authentication of the first encryption chip data signature so as to confirm whether the first encryption chip data is tampered or not; the method is simple and quick, can quickly realize the encryption of the first encryption chip data, and ensures the safety of the first encryption chip data sent to the target electronic component through the antenna.
Example 2
As shown in fig. 2, on the basis of embodiment 1, the encryption module provided in the embodiment of the present application encrypts the chip data to be encrypted by using an encryption key, and specifically includes:
s101: decomposing the first encryption chip data into table names, fields and data records;
s102: the first encryption chip data which are decomposed into table names, fields and data records are scrambled by adopting data information, so that scrambled first encryption chip data are obtained;
s103: acquiring an initial key of an encryption module;
s104: accumulating the scrambled first encryption chip data according to bytes, taking the accumulated first encryption chip data as characteristic values of table names, fields and data records, and taking the difference value of the characteristic values and an initial key as the difference degree of the first encryption chip data;
s105: and encrypting the scrambled first encryption chip data by using the degree of difference as an initial parameter and adopting encryption mode diffusion to obtain second encryption chip data.
The field also includes a field type and a field length.
The working principle and beneficial effects of the technical scheme are as follows: according to the application, the first encryption chip data is decomposed into the table name, the field and the data record, the data information is adopted for scrambling, the scrambled first encryption chip data is obtained, the plaintext characteristics of the first encryption chip data are completely cleared by the scrambled first encryption chip data, the safety of the first encryption chip data is improved, and the leakage risk is reduced; and accumulating the scrambled first encryption chip data according to bytes to obtain a characteristic value, further obtaining the difference degree of the first encryption chip data, encrypting the scrambled first encryption chip data by adopting encryption mode diffusion, expanding the sensitivity of the difference degree to the first encryption chip data, improving the diffusion encryption efficiency, being beneficial to further improving the safety of the data and providing guarantee for the communication transmission safety of the encryption chip.
Example 3
Based on embodiment 2, the formula of data information scrambling provided in the embodiment of the present application is:
wherein x, y and z respectively represent the scrambled table name, field and data record, a and b represent the data information scrambled transformation parameters, x 1 、y 1 And z 1 The table name, the field and the data record of the first encryption chip data are respectively represented, A, B and C respectively represent the sizes of the table name, the field and the data record, and 1 represents the initial values of the table name, the field and the data record;
cipher text D of encryption modulo diffusion:
where E represents the initial key, K represents the ciphertext vector, and P represents the degree of variance.
The working principle and beneficial effects of the technical scheme are as follows: the application uses data information scrambling to the first encryption chip data which is decomposed into table names, fields and data records, obtains the scrambled first encryption chip data through a data information scrambling formula, completely clears the plaintext characteristics of the first encryption chip data, improves the safety of the first encryption chip data, reduces the leakage risk, improves the data information scrambling efficiency, reduces the load of the encryption chip, and simultaneously reduces the algorithm complexity of the encryption chip; the encryption module spreads and encrypts the disordered first encryption chip data, so that the sensitivity of the difference degree to the first encryption chip data is increased, and the efficiency of spreading and encryption is improved.
Example 4
As shown in fig. 3, on the basis of embodiment 1, the encryption key provided in the embodiment of the present application is encrypted to obtain a key block, which specifically includes:
s201: the control module transmits the information obtained by the first encryption key signcryption to the first encryption module; transmitting the information obtained by the second encryption key signcryption to a second encryption module; then transmitting the information obtained by the third encryption key signcryption to a third encryption module;
s202: the first encryption key, the second encryption key, and the third encryption key, and the public key are formed into a key block.
The working principle and beneficial effects of the technical scheme are as follows: the method comprises the steps that information obtained by a first encryption key is transmitted to a first encryption module through a control module; transmitting the information obtained by the second encryption key signcryption to a second encryption module; and then, the information obtained by the third encryption key signcryption is transmitted to a third encryption module, so that the encryption key is distributed, the encryption efficiency of the encryption module on the encryption key is improved, the encryption time is shortened, the data security is improved, and the leakage probability is reduced.
Example 5
As shown in fig. 4, on the basis of embodiment 1, the method for signing data of the first encryption chip and calculating the digest value according to the embodiment of the present application specifically includes:
s401: calculating a byte range corresponding to the signature according to the attribute information of the first encryption chip data and the digital signature algorithm;
s402: extracting byte range data of the first encrypted chip data according to the byte range;
s403: the digest value is calculated from the byte range data.
The working principle and beneficial effects of the technical scheme are as follows: according to the application, the byte range corresponding to the signature is calculated according to the attribute information of the first encryption chip data and the digital signature algorithm; extracting byte range data of the first encrypted chip data according to the byte range; and calculating a digest value according to the byte range data, transmitting the digest value to an antenna resonance module, transmitting the digest value to a target electronic component through an antenna, and comparing whether the digest value is the same or not by carrying out signature authentication on the data signature of the first encryption chip so as to confirm whether the data of the first encryption chip is tampered or not.
Example 6
On the basis of embodiment 5, the attribute information of the digital signature algorithm provided by the embodiment of the application comprises: a public key and a private key of the encryption key; the signature equation of the digital signature algorithm is:
α=ε λ modθ
β=ε μ modθ
γ=ε v modθ
δ=(λβ+μγ+νξ)mod(θ-1)
wherein λ is a private key, μ and ν are secret random numbers, α, θ and ε are public keys, γ, β and ζ are digital signatures, and δ represents first encryption chip data.
The working principle and beneficial effects of the technical scheme are as follows: the application adopts the digital signature algorithm to carry out digital signature on the first encryption chip data, improves the confidentiality of the first encryption chip data, reduces the probability of successful attack, is beneficial to improving the working efficiency of the encryption module, and optimizes the performance of the encryption chip.
Example 7
On the basis of embodiment 1, the antenna resonance module provided by the embodiment of the application is provided with an anti-interference device, and is used for processing interference signals in the process of sending the second encryption chip data, the first encryption chip data signature, the key block and the abstract value to the target electronic component, and specifically comprises the following steps:
the antenna resonance module receives the second encryption chip data, the first encryption chip data signature, the key block and the abstract value, then performs pulse coding modulation to obtain an analog signal, and sends the analog signal to an analog-to-digital sampling and enters an editable array logic to obtain a digital signal;
quadrature down-conversion low-pass filtering is carried out on the digital signals to obtain quadrature digital signals, and the quadrature digital signals are multiplied by the self-adaptive weight to finish interference filtering;
and outputting the digital signal after interference filtering processing, wherein the digital signal comprises the second encryption chip data, the first encryption chip data signature, the key block and the digest value.
The working principle and beneficial effects of the technical scheme are as follows: the antenna resonance module is provided with the anti-interference device, and is used for processing interference signals in the process of sending the second encryption chip data, the first encryption chip data signature, the key block and the abstract value to the target electronic component, so that the probability of interference of the second encryption chip data, the first encryption chip data signature, the key block and the abstract value is reduced, the sending efficiency of the antenna resonance module is improved, and the fact that the second encryption chip data, the first encryption chip data signature, the key block and the abstract value can accurately reach the target electronic component is ensured.
Example 8
On the basis of embodiment 1, the identification of the identity of the target electronic component by the communication module provided by the embodiment of the application comprises the following steps:
the computer vision unit acquires a picture of the target electronic component, intercepts a text region of the picture, and recognizes text features of the text region to obtain a text recognition result;
and matching the character recognition result with the equipment characteristics of the storage module, and determining the identity of the target electronic component according to the characters.
The working principle and beneficial effects of the technical scheme are as follows: according to the application, characters in the picture recognition character area of the target electronic component are recognized, the character recognition result is matched with the equipment characteristics of the storage module, the characters corresponding to the recognized characters are precisely recognized, the identity of the target electronic component is determined through the characters, the accuracy and the stability of the identity of the target electronic component are ensured through the accuracy of character recognition, and the communication safety of the encryption chip is realized.
Example 9
As shown in fig. 5, on the basis of embodiment 1, the encryption chip provided in the embodiment of the present application includes:
the rectification module is used for generating a power supply required by the encryption chip;
the frequency removing module is connected with the rectifying module in parallel and is used for generating a clock required by the encryption chip;
the control module is respectively and electrically connected with the rectification module and the frequency-dividing module and is used for controlling the working flow of the encryption chip;
the storage module is electrically connected with the control module and used for storing chip data;
the communication module is connected with the encryption module, the control module and the storage module and is used for realizing communication of the encryption chip, identifying the identity of the target electronic component, comparing the identity with the equipment characteristics stored by the storage module, and sending the encrypted encryption chip data to the antenna resonance module under the control of the control module after the identity identification is successful; a computer vision unit for acquiring pictures of the target electronic components is arranged in the communication module;
the encryption module is respectively and electrically connected with the control module and the storage module and comprises a plurality of encryption modules for encrypting the data of the encryption chip;
and the antenna resonance module is connected with the communication module and used for transmitting the encrypted chip data encrypted by the encryption module to the target electronic component through the antenna.
The working principle and beneficial effects of the technical scheme are as follows: the application adopts the rectifying module to generate the power supply required by the encryption chip; the frequency removing module is used for generating a clock required by the encryption chip; the control module is used for controlling the working flow of the encryption chip; the memory module is used for storing the chip data; the encryption module is used for encrypting the encrypted chip data; the antenna resonance module is used for sending the encrypted chip data encrypted by the encryption module to the target electronic component through the antenna. According to the application, the encryption module is used for encrypting the data of the encryption chip, and then the antenna resonance module is used for wireless transmission, so that the safety of communication transmission of the encryption frequency offset is improved, the leakage of the data is avoided, and the overall safety of the encryption chip is improved.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present application without departing from the spirit or scope of the application. Thus, it is intended that the present application also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.

Claims (4)

1. The method for improving the communication transmission security of the encryption chip is characterized by comprising the following steps of:
the encryption module receives the first encryption chip data, and encrypts the first encryption chip data by adopting an encryption key to obtain second encryption chip data;
the encryption module encrypts the encryption key under the control of the control module to obtain a key block; signing the first encryption chip data and calculating a digest value;
the communication module recognizes the identity of the target electronic component, and transmits the second encryption chip data, the first encryption chip data signature, the key block and the digest value to the antenna resonance module, and the second encryption chip data, the first encryption chip data signature, the key block and the digest value are transmitted to the target electronic component through the antenna;
the control module transmits the information obtained by the first encryption key signcryption to the first encryption module; transmitting the information obtained by the second encryption key signcryption to a second encryption module; then transmitting the information obtained by the third encryption key signcryption to a third encryption module;
forming a key block from the first encryption key, the second encryption key, and the third encryption key and the public key;
encrypting the chip data to be encrypted specifically comprises the following steps:
decomposing the first encryption chip data into table names, fields and data records;
the first encryption chip data which are decomposed into table names, fields and data records are scrambled by adopting data information, so that scrambled first encryption chip data are obtained;
acquiring an initial key of an encryption module;
accumulating the scrambled first encryption chip data according to bytes, taking the accumulated first encryption chip data as characteristic values of table names, fields and data records, and taking the difference value of the characteristic values and an initial key as the difference degree of the first encryption chip data;
encrypting the scrambled first encryption chip data by using the degree of difference as an initial parameter and adopting encryption mode diffusion to obtain second encryption chip data;
the formula of data information scrambling is:
wherein x, y and z respectively represent the scrambled table name, field and data record, a and b represent the data information scrambled transformation parameters, x 1 、y 1 And z 1 The table name, the field and the data record of the first encryption chip data are respectively represented, A, B and C respectively represent the sizes of the table name, the field and the data record, and 1 represents the initial values of the table name, the field and the data record;
cipher text D of encryption modulo diffusion:
wherein E represents an initial key, K represents a ciphertext vector, and P represents a degree of difference;
signing the first encryption chip data and calculating a digest value, specifically comprising:
calculating a byte range corresponding to the signature according to the attribute information of the first encryption chip data and the digital signature algorithm;
extracting byte range data of the first encrypted chip data according to the byte range;
calculating a digest value from the byte range data;
attribute information of a digital signature algorithm, comprising: a public key and a private key of the encryption key;
the signature equation of the digital signature algorithm is:
α=ε λ modθ
β=ε μ modθ
γ=ε v modθ
δ=(λβ+μγ+vξ)mod(θ-1)
where λ is a private key, μ and v are secret random numbers, α, θ and ε are public keys, γ, β and ζ are digital signatures, and δ represents the first encrypted chip data.
2. The method for improving security of communication transmissions of an encrypted chip of claim 1, wherein the field further comprises a field type and a field length.
3. The method for improving the communication transmission safety of the encryption chip according to claim 1, wherein the antenna resonance module receives the second encryption chip data, the first encryption chip data signature, the key block and the digest value, then changes the second encryption chip data, the first encryption chip data signature, the key block and the digest value into analog signals through pulse code modulation, and sends the analog signals to analog-digital sampling to enter editable array logic to obtain digital signals;
quadrature down-conversion low-pass filtering is carried out on the digital signals to obtain quadrature digital signals, and the quadrature digital signals are multiplied by the self-adaptive weight to finish interference filtering;
and outputting the digital signal after interference filtering processing, wherein the digital signal comprises the second encryption chip data, the first encryption chip data signature, the key block and the digest value.
4. An encryption chip, comprising:
the rectification module is used for generating a power supply required by the encryption chip;
the frequency removing module is connected with the rectifying module in parallel and is used for generating a clock required by the encryption chip;
the control module is respectively and electrically connected with the rectification module and the frequency-dividing module and is used for controlling the working flow of the encryption chip;
the storage module is electrically connected with the control module and used for storing chip data;
the communication module is connected with the encryption module, the control module and the storage module and is used for realizing communication of the encryption chip, identifying the identity of the target electronic component, comparing the identity with the equipment characteristics stored by the storage module, and sending the encrypted encryption chip data to the antenna resonance module under the control of the control module after the identity identification is successful;
the encryption module is respectively and electrically connected with the control module and the storage module and comprises a plurality of encryption modules for encrypting the data of the encryption chip; the encryption module receives the first encryption chip data, and encrypts the first encryption chip data by adopting an encryption key to obtain second encryption chip data; accumulating the scrambled first encryption chip data according to bytes, taking the accumulated first encryption chip data as characteristic values of table names, fields and data records, and taking the difference value of the characteristic values and an initial key as the difference degree of the first encryption chip data; encrypting the scrambled first encryption chip data by using the degree of difference as an initial parameter and adopting encryption mode diffusion to obtain second encryption chip data;
the formula of data information scrambling is:
wherein x, y and z respectively represent the scrambled table name, field and data record, a and b represent the data information scrambled transformation parameters, x 1 、y 1 And z 1 The table name, the field and the data record of the first encryption chip data are respectively represented, A, B and C respectively represent the sizes of the table name, the field and the data record, and 1 represents the initial values of the table name, the field and the data record;
cipher text D of encryption modulo diffusion:
wherein E represents an initial key, K represents a ciphertext vector, and P represents a degree of difference;
the antenna resonance module is connected with the communication module and used for transmitting the encrypted chip data encrypted by the encryption module to the target electronic component through the antenna;
the antenna resonance module is provided with an anti-interference device for processing interference signals in the process of transmitting the second encryption chip data, the first encryption chip data signature, the key block and the abstract value to the target electronic component;
signing the first encryption chip data, calculating a digest value, and calculating a byte range corresponding to the signature according to the attribute information of the first encryption chip data and a digital signature algorithm;
attribute information of a digital signature algorithm, comprising: a public key and a private key of the encryption key; the signature equation of the digital signature algorithm is:
α=ε λ modθ
β=ε μ modθ
γ=ε v modθ
δ=(λβ+μγ+vξ)mod(θ-1)
wherein λ is a private key, μ and ν are secret random numbers, α, θ and ε are public keys, γ, β and ζ are digital signatures, and δ represents first encryption chip data.
CN202211291580.5A 2022-10-19 2022-10-19 Method for improving communication transmission safety of encryption chip and encryption chip Active CN115913565B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211291580.5A CN115913565B (en) 2022-10-19 2022-10-19 Method for improving communication transmission safety of encryption chip and encryption chip

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211291580.5A CN115913565B (en) 2022-10-19 2022-10-19 Method for improving communication transmission safety of encryption chip and encryption chip

Publications (2)

Publication Number Publication Date
CN115913565A CN115913565A (en) 2023-04-04
CN115913565B true CN115913565B (en) 2023-08-15

Family

ID=86488861

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211291580.5A Active CN115913565B (en) 2022-10-19 2022-10-19 Method for improving communication transmission safety of encryption chip and encryption chip

Country Status (1)

Country Link
CN (1) CN115913565B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104734855A (en) * 2015-02-12 2015-06-24 天地融科技股份有限公司 Communication methods and system of intelligent secret key device and intelligent secret key device
CN112235794A (en) * 2020-11-17 2021-01-15 南京博洛米通信技术有限公司 WAPI module with encryption chip and transmission method
CN113806772A (en) * 2021-09-03 2021-12-17 武汉虹旭信息技术有限责任公司 Information encryption transmission method and device based on block chain
EP3968597A1 (en) * 2019-11-26 2022-03-16 China Unionpay Co., Ltd Methods and apparatuses for encrypting and decrypting data, storage medium and encrypted file
CN114826656A (en) * 2022-03-02 2022-07-29 国家电网有限公司大数据中心 Trusted data link transmission method and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11755747B2 (en) * 2020-12-31 2023-09-12 Meta Platforms Technologies, Llc High throughput storage encryption

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104734855A (en) * 2015-02-12 2015-06-24 天地融科技股份有限公司 Communication methods and system of intelligent secret key device and intelligent secret key device
EP3968597A1 (en) * 2019-11-26 2022-03-16 China Unionpay Co., Ltd Methods and apparatuses for encrypting and decrypting data, storage medium and encrypted file
CN112235794A (en) * 2020-11-17 2021-01-15 南京博洛米通信技术有限公司 WAPI module with encryption chip and transmission method
CN113806772A (en) * 2021-09-03 2021-12-17 武汉虹旭信息技术有限责任公司 Information encryption transmission method and device based on block chain
CN114826656A (en) * 2022-03-02 2022-07-29 国家电网有限公司大数据中心 Trusted data link transmission method and system

Also Published As

Publication number Publication date
CN115913565A (en) 2023-04-04

Similar Documents

Publication Publication Date Title
US8275123B2 (en) Integrated data transceiver and sensor for the generation of a symmetrical cryptographic key
EP0696397B1 (en) Digital radio transceiver with encrypted key storage
CN100586061C (en) Communication system and communication device
Karthikeyan et al. RFID security without extensive cryptography
US8812845B2 (en) Authentication method
US7792290B2 (en) Gathering randomness in a wireless smart card reader
US8270602B1 (en) Communication systems, transceivers, and methods for generating data based on channel characteristics
CA2690755A1 (en) System and method of per-packet keying
CN101707767B (en) Data transmission method and devices
CN101317357B (en) Key management
Chen et al. An ownership transfer scheme using mobile RFIDs
CN110247752A (en) LoRa chaotic communication system and its implementation based on elliptic curve cryptography
US9154481B1 (en) Decryption of a protected resource on a cryptographic device using wireless communication
CN115913565B (en) Method for improving communication transmission safety of encryption chip and encryption chip
Baek et al. Secure and lightweight authentication protocol for NFC tag based services
KR100796438B1 (en) Apparatus and method for RFID Authentication Protocol
Wang et al. A new RFID authentication protocol with ownership transfer in an insecure communication environment
EP1713201B1 (en) Gathering randomness in a smart card reader
Fernàndez-Mir et al. Secure and scalable RFID authentication protocol
CN113795023A (en) Bluetooth data transmission encryption method based on chaotic sequence and block encryption
WO2009141773A2 (en) Method and device for encrypted active near field communication
Abduljabbar et al. Robust scheme to protect authentication code of message/image documents in cloud computing
Hancke Noisy carrier modulation for HF RFID
JP2005051368A (en) Communication apparatus, base station apparatus and communication system
Sarier A new approach for biometric template storage and remote authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant