TWI788240B - Electronic device and data transmission method thereof - Google Patents
Electronic device and data transmission method thereof Download PDFInfo
- Publication number
- TWI788240B TWI788240B TW111109102A TW111109102A TWI788240B TW I788240 B TWI788240 B TW I788240B TW 111109102 A TW111109102 A TW 111109102A TW 111109102 A TW111109102 A TW 111109102A TW I788240 B TWI788240 B TW I788240B
- Authority
- TW
- Taiwan
- Prior art keywords
- data
- redundant
- storage device
- insertion type
- controller
- Prior art date
Links
Images
Landscapes
- Communication Control (AREA)
- Facsimile Transmission Control (AREA)
Abstract
Description
本發明是有關於一種電子裝置及其資料傳輸方法,且特別是有關於一種可確保資料安全性的電子裝置的資料傳輸方法。 The present invention relates to an electronic device and a data transmission method thereof, and in particular to a data transmission method of an electronic device capable of ensuring data security.
為了確保資料不會被竊取,控制器與儲存裝置間的資料傳輸動作中,常設置有加密的機制。在習知技術中,控制器可使傳輸資料與作為金鑰的資訊進行複雜的加密運算,並獲得加密資料。這樣的加密方法需要使接收端利用作為金鑰的資訊來對加密資料進行反運算來還原傳輸資料。 In order to ensure that the data will not be stolen, an encryption mechanism is often set in the data transmission between the controller and the storage device. In the conventional technology, the controller can perform complex encryption operation on the transmission data and the information as the key to obtain the encrypted data. Such an encryption method needs to enable the receiving end to use the information as a key to perform reverse operations on the encrypted data to restore the transmitted data.
此外,習知技術還可利用數位簽章的認證方式,來使接收端確認所接收的傳輸資料是否為正確的未經變造的資料。然而,這樣的方式無法針對被傳送的傳輸資料進行加密,無法防止傳輸資料被竊取。且數位簽章的認證動作也需要一定複雜程度的演算法來進行,因此提高硬體的複雜度且增加所需功率的消耗。 In addition, the conventional technology can also use the digital signature authentication method to make the receiving end confirm whether the received transmission data is correct and unaltered data. However, such a method cannot encrypt the transmitted transmission data, and cannot prevent the transmission data from being stolen. Moreover, the authentication action of the digital signature also requires a certain degree of complexity of the algorithm to perform, thus increasing the complexity of the hardware and increasing the required power consumption.
基於上述,如何設計出可確保傳輸資料的安全性,又可不需要過度複雜的演算法及硬體電路的加密機制,成為本領域設 計者的重要課題。 Based on the above, how to design an encryption mechanism that can ensure the security of transmitted data without requiring overly complicated algorithms and hardware circuits has become a design challenge in this field. An important topic for planners.
本發明提供一種電子裝置以及資料傳輸方法,可減低加密運算的複雜度,並可確保資料傳輸的安全性。 The invention provides an electronic device and a data transmission method, which can reduce the complexity of encryption operations and ensure the security of data transmission.
本發明的資料傳輸方法包括:設定具有多個冗餘位元的冗餘資料;根據插入型態以在傳輸資料中插入冗餘資料的冗餘位元,並產生加密資料;以及,傳送加密資料至儲存裝置。 The data transmission method of the present invention includes: setting redundant data with a plurality of redundant bits; inserting redundant bits of the redundant data into the transmission data according to the insertion type, and generating encrypted data; and, transmitting the encrypted data to the storage device.
本發明的電子裝置包括儲存裝置以及控制器。控制器耦接電子裝置。控制器用以設定具有多個冗餘位元的冗餘資料;根據插入型態以在傳輸資料中插入冗餘資料的冗餘位元,並產生加密資料;以及,傳送加密資料至儲存裝置。 The electronic device of the present invention includes a storage device and a controller. The controller is coupled to the electronic device. The controller is used for setting redundant data with a plurality of redundant bits; inserting redundant bits of redundant data into the transmission data according to the insertion type, and generating encrypted data; and sending the encrypted data to the storage device.
基於上述,本發明的電子裝置的控制器,透過將冗餘資料的多個冗餘位元,根據插入型態以插入傳輸資料來產生加密資料。可有效降低加密資料的產生的複雜度,且可確保傳輸資料在傳輸的過程中被竊取,有效確保傳輸資料的安全性。 Based on the above, the controller of the electronic device of the present invention generates encrypted data by inserting multiple redundant bits of the redundant data into the transmission data according to the insertion type. It can effectively reduce the complexity of generating encrypted data, and can ensure that the transmission data is stolen during transmission, effectively ensuring the security of the transmission data.
100、400:電子裝置 100, 400: electronic devices
110、410:控制器 110, 410: controller
120、420:儲存裝置 120, 420: storage device
121、4211:查找資訊 121, 4211: Find information
421、500:查找表 421, 500: lookup table
CDD1~CDDM:待查冗餘資料 CDD1~CDDM: Redundant data to be checked
CI1~CIM:待查插入型態資訊 CI1~CIM: Insert type information to be checked
DD:冗餘資料 DD: redundant data
DD[0]~DD[N]:冗餘位元 DD[0]~DD[N]: redundant bits
MD、201、202、203、204:加密資料 MD, 201, 202, 203, 204: encrypted data
S610~S630:資料傳輸步驟 S610~S630: Data transmission steps
TD:傳輸資料 TD: Transfer Data
TD[0]~TD[N]:位元 TD[0]~TD[N]: bits
圖1及圖4繪示本發明不同實施例的電子裝置的示意圖。 1 and 4 are schematic diagrams of electronic devices according to different embodiments of the present invention.
圖2A至圖2D繪示本發明實施例的多個加密資料的產生方式的示意圖。 FIG. 2A to FIG. 2D are schematic diagrams illustrating a generation method of a plurality of encrypted data according to an embodiment of the present invention.
圖3繪示本發明實施例的電子裝置的加密資料的產生方式的一實施方式的示意圖。 FIG. 3 is a schematic diagram of an implementation manner of generating encrypted data of an electronic device according to an embodiment of the present invention.
圖5繪示本發明實施例的查找資訊的示意圖。 FIG. 5 is a schematic diagram of searching information according to an embodiment of the present invention.
圖6繪示本發明實施例的資料傳輸動作的流程圖。 FIG. 6 is a flow chart of the data transmission operation of the embodiment of the present invention.
請參照圖1,圖1繪示本發明一實施例的電子裝置的示意圖。電子裝置100包括控制器110以及儲存裝置120。控制器110耦接至儲存裝置120。控制器110與儲存裝置120間,進行傳輸資料的接收以及發送動作。在當控制器110要將傳輸資料傳送至儲存裝置120時,控制器110可預先設定一冗餘資料。冗餘資料具有多個冗餘位元。並且,控制器110可根據一插入型態以在傳輸資料中插入冗餘資料的多個冗餘位元,並藉以產生加密資料MD。並且,控制器110可將加密資料MD傳送至儲存裝置120中。
Please refer to FIG. 1 , which is a schematic diagram of an electronic device according to an embodiment of the present invention. The
在另一方面,儲存裝置120在接收到加密資料MD後,可基於一查找資訊121以根據插入型態來獲得冗餘資料。在此,控制器110產生加密資料MD所應用的插入型態可對應一插入型態資訊,這個插入型態資訊可以預先被設定在儲存裝置120中。此外,儲存裝置120中也可預存查找資訊121。因此,儲存裝置120在接收到加密資料MD後,可根據插入型態資訊來對查找資訊121進行查找動作,進以獲得控制器110所使用的插入型態以及加密資料MD中的冗餘資料。接著,儲存裝置120則可根據插入型
態由加密資料MD來移除冗餘資料中的多個冗餘位元,並還原出傳輸資料。如此一來,儲存裝置120可進行傳輸資料的儲存動作。
On the other hand, after receiving the encrypted data MD, the
在本實施例中,儲存裝置120可以為可程式化的非揮發性記憶體,例如快閃記憶體、電阻式記憶體、磁阻式記憶體、相變化記憶體或鐵電記憶體等。儲存裝置120或也可以為揮發性記憶體,例如動態隨機存取記憶體或靜態隨機存取記憶體。另外,儲存裝置120可利用儲存傳輸資料的記憶體來儲存查找資訊121。或者,查找資訊121也可以儲存在與儲存傳輸資料不相同的記憶體中,沒有固定的限制。
In this embodiment, the
附帶一提的,本實施例中的查找資訊121是可以動態調整的。控制器110可以針對所應用的插入型態與對應的插入的冗餘資料進行調整。在調整後,控制器110可針對儲存裝置120中的查找資訊121進行更新。上述的查找資訊121的更新動作可以週期性的被執行,以提升加密資料的安全度。
Incidentally, the
本發明的控制器110可以為具運算能力的處理器。或者,控制器110可以是透過硬體描述語言(Hardware Description Language,HDL)或是其他任意本領域具通常知識者所熟知的數位電路的設計方式來進行設計,並透過現場可程式邏輯門陣列(Field Programmable Gate Array,FPGA)、複雜可程式邏輯裝置(Complex Programmable Logic Device,CPLD)或是特殊應用積體電路(Application-specific Integrated Circuit,ASIC)的方式來實現的硬體電路。
The
關於插入型態的種類,請參照圖2A至圖2D繪示的本發明實施例的多個加密資料的產生方式的示意圖。在圖2A中,加密資料201是利用針對傳輸資料TD,將冗餘資料DD進行前置式插入所產生的。其中,冗餘資料DD的多個位元被插入至傳輸資料TD的前端(例如最小有效位元那一端)的位置上。其中,冗餘資料DD的冗餘位元的數量可以多於、等於或少於傳輸資料TD的位元數,沒有一定的限制。
Regarding the types of insertion types, please refer to the schematic diagrams of the generation methods of multiple encrypted data in the embodiment of the present invention shown in FIG. 2A to FIG. 2D . In FIG. 2A ,
在圖2B中,加密資料202是利用針對傳輸資料TD,將冗餘資料DD進行後置式插入所產生的。其中,冗餘資料DD的多個位元被插入至傳輸資料TD的後端(例如最大有效位元那一端)的位置上。同樣的,冗餘資料DD的冗餘位元的數量可以多於、等於或少於傳輸資料TD的位元數,沒有一定的限制。
In FIG. 2B ,
在圖2C中,加密資料203是利用針對傳輸資料TD,將冗餘資料DD的多個冗餘位元DD[0]~DD[N]進行交錯式插入所產生的。在本實施例中,傳輸資料TD具有多個位元TD[0]~TD[N]。冗餘資料DD的第一個位元,冗餘位元DD[0]被插入至傳輸資料TD的位元TD[0]與TD[1]間。冗餘資料DD後續的多個冗餘位元DD[1]~DD[N]則可分別被依序插入至相鄰的傳輸資料TD二位元間。如此一來,可以有效降低加密資料203與傳輸資料TD間的相似度。 In FIG. 2C , the encrypted data 203 is generated by interleaving a plurality of redundant bits DD[0]˜DD[N] of the redundant data DD for the transmission data TD. In this embodiment, the transmission data TD has a plurality of bits TD[0]˜TD[N]. The first bit of the redundancy data DD, the redundancy bit DD[0] is inserted between the bits TD[0] and TD[1] of the transmission data TD. A plurality of redundant bits DD[ 1 ]˜DD[N] following the redundant data DD can be sequentially inserted between two adjacent bits of the transmission data TD respectively. In this way, the similarity between the encrypted data 203 and the transmission data TD can be effectively reduced.
在圖2D中,加密資料204同樣是利用針對傳輸資料TD,將冗餘資料DD的多個冗餘位元DD[0]~DD[N]進行交錯式插入所 產生的。在本實施例中,冗餘資料DD的第一個位元(冗餘位元DD[0])被插入至傳輸資料TD的位元TD[0]前,冗餘資料DD後續的多個冗餘位元DD[1]~DD[N]則可被分別依序插入至相鄰的傳輸資料TD二位元間。同樣的,這樣的插入動作,也可以有效降低加密資料204與傳輸資料TD間的相似度。 In FIG. 2D, the encrypted data 204 is also interleaved by inserting multiple redundant bits DD[0]~DD[N] of the redundant data DD for the transmission data TD. produced. In this embodiment, the first bit (redundant bit DD[0]) of the redundant data DD is inserted before the bit TD[0] of the transmission data TD, and the subsequent multiple redundant bits of the redundant data DD The remaining bits DD[1]~DD[N] can be sequentially inserted between two adjacent bits of the transmission data TD. Similarly, such an insertion action can also effectively reduce the similarity between the encrypted data 204 and the transmission data TD.
在此請注意,在圖2C、圖2D實施例中,傳輸資料TD的相鄰二位元間僅插入一冗餘位元。在本發明其他實施例中,傳輸資料TD的相鄰二位元間,也可插入一個以上的冗餘位元,沒有一定的限制。並且,傳輸資料TD中的任二相鄰二位元間所插入的冗餘位元數量可以相同,或也可以不相同,並沒有一定的限制。 Please note here that in the embodiments shown in FIG. 2C and FIG. 2D , only one redundant bit is inserted between adjacent two bits of the transmission data TD. In other embodiments of the present invention, more than one redundant bit can also be inserted between adjacent two bits of the transmission data TD, without any limitation. Moreover, the number of redundant bits inserted between any two adjacent bits in the transmission data TD may be the same or different, and there is no certain limitation.
更值得一提的,本發明實施例的前置式插入、後置式插入以及交錯式插入可以單獨或組合式被應用在加密資料的產生動作中。例如,控制器可以使冗餘資料的第一部分冗餘位元前置式的插入至傳輸資料中;使冗餘資料的第二部分冗餘位元後置式的插入至傳輸資料中;並且,使冗餘資料的第三部分冗餘位元交錯式的插入至傳輸資料中。如此,可大幅提升加密資料的複雜度。 It is worth mentioning that the pre-insertion, post-insertion and staggered interleaving in the embodiment of the present invention can be applied individually or in combination in generating encrypted data. For example, the controller may pre-insert the redundant bits of the first part of the redundant data into the transmission data; make the second part of the redundant bits of the redundant data post-insert into the transmitted data; and, make The third redundant bit of the redundant data is interleaved into the transmission data. In this way, the complexity of encrypted data can be greatly increased.
以下可參照圖3,圖3繪示本發明實施例的電子裝置的加密資料的產生方式的一實施方式的示意圖。在圖3的實施方式中,傳輸資料例如具有八個位元TD[0]~TD[7]。位元TD[0]~TD[7]的邏輯值例如分別為1、0、1、0、1、0、1、0。冗餘資料同樣具有八個冗餘位元DD[0]~DD[7],冗餘位元DD[0]~DD[7]的邏輯值例如分別為1、1、1、0、0、0、0、1。在此,控制器可根據交錯式插 入的插入型態,使冗餘資料的冗餘位元DD[0]~DD[7]分別交錯式插入至傳輸資料的八個位元TD[0]~TD[7]中,並使所產生的加密資料MD具有16個位元,其中的邏輯值分別為1、1、0、1、1、1、0、0、1、0、0、0、1、0、0、1。 Referring to FIG. 3 , FIG. 3 is a schematic diagram illustrating an implementation manner of an encrypted data generation method of an electronic device according to an embodiment of the present invention. In the embodiment of FIG. 3 , the transmission data has, for example, eight bits TD[0]˜TD[7]. Logical values of the bits TD[0]˜TD[7] are, for example, 1, 0, 1, 0, 1, 0, 1, 0, respectively. The redundant data also has eight redundant bits DD[0]~DD[7]. The logical values of the redundant bits DD[0]~DD[7] are, for example, 1, 1, 1, 0, 0, 0, 0, 1. Here, the controller can The inserted insertion type makes the redundant bits DD[0]~DD[7] of the redundant data interleavedly inserted into the eight bits TD[0]~TD[7] of the transmission data respectively, and makes all The generated encrypted data MD has 16 bits, the logical values of which are 1, 1, 0, 1, 1, 1, 0, 0, 1, 0, 0, 0, 1, 0, 0, 1 respectively.
關於本實施方式中,傳輸資料的位元TD[0]~TD[7]的邏輯值以及冗餘位元DD[0]~DD[7]都只是說明用範例。傳輸資料的位元TD[0]~TD[7]的邏輯值以及冗餘位元DD[0]~DD[7]都可以是任意值,沒有一定的限制。 In this embodiment, the logical values of the bits TD[0]-TD[7] of the transmission data and the redundant bits DD[0]-DD[7] are just examples for illustration. The logical values of the bits TD[0]~TD[7] of the transmission data and the redundant bits DD[0]~DD[7] can be arbitrary values without certain restrictions.
由上述的說明可以得知,透過冗餘資料對傳輸資料進行的插入動作,傳輸資料與被傳輸的加密資料MD間可具有相當程度的差異度。因此,可以確保傳輸資料在傳輸過程中,不會輕易被外界所竊取,確保傳輸資料的安全度。 From the above description, it can be seen that through the insertion of redundant data into the transmission data, there may be a considerable degree of difference between the transmission data and the transmitted encrypted data MD. Therefore, it can be ensured that the transmission data will not be easily stolen by the outside during the transmission process, ensuring the security of the transmission data.
請參照圖4,圖4繪示本發明另一實施例的電子裝置的示意圖。電子裝置400包括控制器410以及儲存裝置420。本實施例的傳輸資料的加密以及傳輸方式與圖1的實施例的相同,在此不多贅述。與圖1實施例不相同的,儲存裝置420中設置查找表421。查找表421用以儲存查找資訊4211。在此,查找表421可以是任意形式的記憶體。查找表421中的查找資訊4211,可以由控制器410來進行寫入。控制器410並可在需要時,針對查找表421中的查找資訊4211進行動態調整。可有效提升傳輸資料的安全性。
Please refer to FIG. 4 , which is a schematic diagram of an electronic device according to another embodiment of the present invention. The
以下請參照圖5,圖5繪示本發明實施例的查找資訊的示意圖。查找資訊500包括多個待查插入型態資訊CI1~CIM以及分
別對應的多個待查冗餘資料CDD1~CDDM。待查插入型態資訊CI1~CIM的每一者可具有一個或多個位元的數位值。待查冗餘資料CDD1~CDDM的每一者則可為具有多個位元的數位值。當查找動作被執行時,可使所接收的插入型態資訊來與多個待查插入型態資訊CI1~CIM進行比對,並查找出與輸入的插入型態資訊相同的待查插入型態資訊(例如為待查插入型態資訊CI1)。接著,儲存裝置可輸出待查插入型態資訊CI1對應的待查冗餘資料CDD1,並據以執行傳輸資料的回復動作。
Please refer to FIG. 5 below. FIG. 5 is a schematic diagram of searching information according to an embodiment of the present invention.
以下請參照圖6,圖6繪示本發明實施例的資料傳輸動作的流程圖。其中,步驟S610中,控制器可設定具有多個冗餘位元的冗餘資料。並且,在步驟S620中,控制器可根據插入型態以在傳輸資料中插入冗餘資料的冗餘位元,並產生加密資料。以及,在步驟S630中,控制器可傳送加密資料至儲存裝置。 Please refer to FIG. 6 below. FIG. 6 shows a flow chart of the data transmission operation of the embodiment of the present invention. Wherein, in step S610, the controller may set redundant data having a plurality of redundant bits. Moreover, in step S620, the controller may insert redundant bits of redundant data into the transmission data according to the insertion type, and generate encrypted data. And, in step S630, the controller may transmit the encrypted data to the storage device.
關於上述步驟S610~S630的實施細節,在前述的多個實施例以及實施方式已有詳細的說明,以下恕不多贅述。 The implementation details of the above steps S610-S630 have been described in detail in the above-mentioned multiple embodiments and implementation manners, and will not be described in detail below.
此外,本發明實施例中,儲存裝置可基於查找資訊以根據控制器所應用的插入型態來獲得冗餘資料。儲存裝置並可根據插入型態由加密資料來移除冗餘位元並還原傳輸資料。關於儲存裝置還原傳輸資料的動作細節,在前述的多個實施例以及實施方式也有詳細的說明,以下恕不多贅述。 In addition, in the embodiment of the present invention, the storage device can obtain redundant data according to the insertion type applied by the controller based on the lookup information. The storage device can also remove redundant bits and restore transmission data from encrypted data according to the insertion type. The operation details of restoring the transmission data by the storage device are also described in detail in the aforementioned multiple embodiments and implementations, and will not be described in detail below.
綜上所述,本發明的電子裝置中,使控制器根據插入型態來對傳輸資料插入冗餘資料,以產生加密資料。並傳輸加密資 料至儲存裝置。這樣一來,加密資料可以避免為外界所竊取,有效保持傳輸資料的安全性。並且,本發明電子裝置所採用的資料插入動作,並不需要複雜的演算法,可有效降低硬體的複雜度以及功率消耗。在另一方面,本發明實施例中的儲存裝置根據插入型態來查找出加密資料中被插入的冗餘資料及插入的位置。如此一來,儲存裝置並可針對加密資料進行冗餘位元的移除,並回復傳輸資料。在不需要應用複雜的演算法的前提下,有效獲得正確的傳輸資料。 To sum up, in the electronic device of the present invention, the controller is configured to insert redundant data into the transmission data according to the insertion type, so as to generate encrypted data. and transmit encrypted data to storage device. In this way, the encrypted data can be prevented from being stolen by the outside world, effectively maintaining the security of the transmitted data. Moreover, the data insertion action adopted by the electronic device of the present invention does not require complex algorithms, which can effectively reduce hardware complexity and power consumption. On the other hand, the storage device in the embodiment of the present invention finds out the inserted redundant data and the inserted position in the encrypted data according to the insertion type. In this way, the storage device can also remove redundant bits for encrypted data and restore the transmission data. Effectively obtain correct transmission data without applying complex algorithms.
100:電子裝置 100: Electronic device
110:控制器 110: Controller
120:儲存裝置 120: storage device
121:查找資訊 121: Find information
MD:加密資料 MD: encrypted data
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW111109102A TWI788240B (en) | 2022-03-11 | 2022-03-11 | Electronic device and data transmission method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW111109102A TWI788240B (en) | 2022-03-11 | 2022-03-11 | Electronic device and data transmission method thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
TWI788240B true TWI788240B (en) | 2022-12-21 |
TW202336616A TW202336616A (en) | 2023-09-16 |
Family
ID=85795274
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW111109102A TWI788240B (en) | 2022-03-11 | 2022-03-11 | Electronic device and data transmission method thereof |
Country Status (1)
Country | Link |
---|---|
TW (1) | TWI788240B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI249666B (en) * | 2003-08-28 | 2006-02-21 | Sunplus Technology Co Ltd | Device using parity check bit to carry out data encryption protection and method thereof |
CN100543761C (en) * | 2005-02-10 | 2009-09-23 | 松下电器产业株式会社 | Program conversion apparatus and program executing apparatus |
CN104091100A (en) * | 2014-07-15 | 2014-10-08 | 电子科技大学 | Software protection method based on intermediate result compiling |
CN105637520A (en) * | 2013-10-14 | 2016-06-01 | 飞索科技有限公司 | Method and apparatus for generating index for encrypted field in database |
WO2020098327A1 (en) * | 2018-11-12 | 2020-05-22 | 中国银联股份有限公司 | Watermark embedding method for data text |
-
2022
- 2022-03-11 TW TW111109102A patent/TWI788240B/en active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI249666B (en) * | 2003-08-28 | 2006-02-21 | Sunplus Technology Co Ltd | Device using parity check bit to carry out data encryption protection and method thereof |
CN100543761C (en) * | 2005-02-10 | 2009-09-23 | 松下电器产业株式会社 | Program conversion apparatus and program executing apparatus |
CN105637520A (en) * | 2013-10-14 | 2016-06-01 | 飞索科技有限公司 | Method and apparatus for generating index for encrypted field in database |
CN104091100A (en) * | 2014-07-15 | 2014-10-08 | 电子科技大学 | Software protection method based on intermediate result compiling |
WO2020098327A1 (en) * | 2018-11-12 | 2020-05-22 | 中国银联股份有限公司 | Watermark embedding method for data text |
Also Published As
Publication number | Publication date |
---|---|
TW202336616A (en) | 2023-09-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6078665A (en) | Electronic encryption device and method | |
JP2019097158A (en) | Forgery prevention communication system | |
US11070383B2 (en) | Random code generator | |
US20220311628A1 (en) | Secure communication between server device and clients utilizing strong physical unclonable functions | |
US20070266067A1 (en) | Pseudo Random Number Generator | |
WO1998010562A9 (en) | Electronic encryption device and method | |
US7813507B2 (en) | Method and system for creating random cryptographic keys in hardware | |
EP3577642A1 (en) | Methods and devices for protecting data | |
EP3499788A1 (en) | Dynamic masking | |
EP3272060B1 (en) | Datastream block encryption | |
WO2019043921A1 (en) | Encryption device, decryption device, encryption method, decryption method, encryption program, and decryption program | |
TWI788240B (en) | Electronic device and data transmission method thereof | |
US20200226270A1 (en) | System and method for multilayer data protection for memory devices | |
Wu et al. | Differential-linear attacks against the stream cipher Phelix | |
US20150058639A1 (en) | Encryption processing device and storage device | |
US11050575B2 (en) | Entanglement and recall system using physically unclonable function technology | |
KR20160039011A (en) | Physically unclonable function circuit using S-box of AES algorithm | |
US20240039901A1 (en) | Electronic device and data transmission method thereof | |
US20050031121A1 (en) | Encryption method and apparatus | |
US20220407679A1 (en) | Information security protection system and information security protection method | |
EP3832945A1 (en) | System and method for protecting memory encryption against template attacks | |
CN116842533A (en) | Electronic device and data transmission method thereof | |
CN104537319A (en) | Device and method for scrambling and descrambling buses and integrated circuit chip | |
CN110943837B (en) | User password encryption method based on improved MD5 encryption algorithm | |
Bernardini et al. | Helper-less physically unclonable functions and chip authentication |