CN104969508B - 用于保护固定长度的数据结构的完整性的方法 - Google Patents

用于保护固定长度的数据结构的完整性的方法 Download PDF

Info

Publication number
CN104969508B
CN104969508B CN201480007504.4A CN201480007504A CN104969508B CN 104969508 B CN104969508 B CN 104969508B CN 201480007504 A CN201480007504 A CN 201480007504A CN 104969508 B CN104969508 B CN 104969508B
Authority
CN
China
Prior art keywords
keys
data structure
masks
authentication code
message authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201480007504.4A
Other languages
English (en)
Chinese (zh)
Other versions
CN104969508A (zh
Inventor
A·W·登特
C·E·阿卡尔
B·B·布伦利
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qualcomm Inc
Original Assignee
Qualcomm Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qualcomm Inc filed Critical Qualcomm Inc
Publication of CN104969508A publication Critical patent/CN104969508A/zh
Application granted granted Critical
Publication of CN104969508B publication Critical patent/CN104969508B/zh
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Power Engineering (AREA)
  • Mathematical Physics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)
CN201480007504.4A 2013-02-07 2014-01-31 用于保护固定长度的数据结构的完整性的方法 Expired - Fee Related CN104969508B (zh)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US13/762,195 2013-02-07
US13/762,195 US9298947B2 (en) 2013-02-07 2013-02-07 Method for protecting the integrity of a fixed-length data structure
PCT/US2014/014148 WO2014123779A1 (en) 2013-02-07 2014-01-31 Method for protecting the integrity of a fixed-length data structure

Publications (2)

Publication Number Publication Date
CN104969508A CN104969508A (zh) 2015-10-07
CN104969508B true CN104969508B (zh) 2018-04-10

Family

ID=50113037

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201480007504.4A Expired - Fee Related CN104969508B (zh) 2013-02-07 2014-01-31 用于保护固定长度的数据结构的完整性的方法

Country Status (6)

Country Link
US (1) US9298947B2 (enExample)
EP (1) EP2954636A1 (enExample)
JP (1) JP6077678B2 (enExample)
KR (1) KR101734205B1 (enExample)
CN (1) CN104969508B (enExample)
WO (1) WO2014123779A1 (enExample)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9443107B2 (en) * 2013-02-19 2016-09-13 Qualcomm Incorporated Method for protecting the integrity of a group of memory elements using an aggregate authentication code
US9177123B1 (en) * 2013-09-27 2015-11-03 Emc Corporation Detecting illegitimate code generators
US10019603B2 (en) * 2014-04-16 2018-07-10 Synopsys, Inc. Secured memory system and method therefor
WO2016064397A1 (en) 2014-10-23 2016-04-28 Hewlett Packard Enterprise Development Lp Admissions control of a device
US10715332B2 (en) 2014-10-30 2020-07-14 Hewlett Packard Enterprise Development Lp Encryption for transactions in a memory fabric
WO2016068941A1 (en) * 2014-10-30 2016-05-06 Hewlett Packard Enterprise Development Lp Secure transactions in a memory fabric
WO2018067232A1 (en) 2016-10-03 2018-04-12 Visa International Service Association Network topology
US10523418B2 (en) * 2016-06-03 2019-12-31 Cryptography Research, Inc. Providing access to a hardware resource based on a canary value
US11349639B2 (en) 2018-12-28 2022-05-31 ePIC Blockchain Technologies Inc. Circuit and method for overcoming memory bottleneck of ASIC-resistant cryptographic algorithms
CN112185435A (zh) * 2019-07-03 2021-01-05 旺宏电子股份有限公司 电子装置、存储器装置及其存储数据的读取方法
US11943367B1 (en) * 2020-05-19 2024-03-26 Marvell Asia Pte, Ltd. Generic cryptography wrapper
US11271739B2 (en) * 2020-06-25 2022-03-08 Digital 14 Llc Error-correcting key agreement for noisy cryptographic systems
JP7314108B2 (ja) * 2020-08-27 2023-07-25 株式会社東芝 暗号処理装置、暗号処理方法およびプログラム
US11698971B2 (en) * 2021-04-15 2023-07-11 Honeywell International Inc. Secure boot device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1386250A (zh) * 2000-06-08 2002-12-18 布尔Cp8公司 在嵌入式微芯片系统,尤其是智能卡的存储器中安全存储敏感数据的方法和实现该方法的嵌入式系统
US20050175175A1 (en) * 2004-02-06 2005-08-11 Marcus Leech Parallelizable integrity-aware encryption technique
CN1779689A (zh) * 2000-01-21 2006-05-31 索尼公司 数据处理设备和数据处理方法
US20080118060A1 (en) * 2006-11-22 2008-05-22 Samsung Electroncs Co., Ltd. Method of decoding/encoding content file
CN101779435A (zh) * 2007-08-08 2010-07-14 高通股份有限公司 分组数据汇聚协议报头中的密钥标识符

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
NZ240019A (en) * 1991-09-30 1996-04-26 Peter John Smith Public key encrypted communication with non-multiplicative cipher
US7069287B2 (en) * 2000-09-19 2006-06-27 Worcester Polytechnic Institute Method for efficient computation of odd characteristic extension fields
JP4087149B2 (ja) * 2002-05-20 2008-05-21 株式会社日立製作所 ディスク装置共有システム、及び計算機
US7500098B2 (en) 2004-03-19 2009-03-03 Nokia Corporation Secure mode controlled memory
US7549045B2 (en) 2004-10-25 2009-06-16 Microsoft Corporation Delegate registration in a managed code execution environment
EP1679573B1 (en) * 2005-01-07 2007-06-27 Telefonaktiebolaget LM Ericsson (publ) Updating memory contents of a processing device
JP2006203564A (ja) 2005-01-20 2006-08-03 Nara Institute Of Science & Technology マイクロプロセッサ、ノード端末、コンピュータシステム及びプログラム実行証明方法
US8189786B2 (en) * 2005-05-25 2012-05-29 Zenith Electronics Llc Encryption system
WO2007052045A2 (en) 2005-11-04 2007-05-10 Isis Innovation Limited Security in computing networks
US8090098B2 (en) * 2006-11-13 2012-01-03 Electronics And Telecommunications Research Institute Method of generating message authentication code using stream cipher and authentication/encryption and authentication/decryption methods using stream cipher
WO2009107442A1 (ja) 2008-02-29 2009-09-03 日本電気株式会社 サーバ認証システム、サーバ認証方法及びサーバ認証用プログラム
JP5248145B2 (ja) * 2008-03-05 2013-07-31 株式会社日立製作所 情報提供サーバ、プログラム、情報提供方法及び情報提供システム
JP5156540B2 (ja) 2008-08-22 2013-03-06 株式会社日立製作所 ハッシュ値生成装置
US8452984B2 (en) * 2008-08-28 2013-05-28 Alcatel Lucent Message authentication code pre-computation with applications to secure memory
US8645714B2 (en) 2010-05-25 2014-02-04 Via Technologies, Inc. Branch target address cache for predicting instruction decryption keys in a microprocessor that fetches and decrypts encrypted instructions
JP5225414B2 (ja) 2011-03-08 2013-07-03 株式会社東芝 暗号演算装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1779689A (zh) * 2000-01-21 2006-05-31 索尼公司 数据处理设备和数据处理方法
CN1386250A (zh) * 2000-06-08 2002-12-18 布尔Cp8公司 在嵌入式微芯片系统,尤其是智能卡的存储器中安全存储敏感数据的方法和实现该方法的嵌入式系统
US20050175175A1 (en) * 2004-02-06 2005-08-11 Marcus Leech Parallelizable integrity-aware encryption technique
US20080118060A1 (en) * 2006-11-22 2008-05-22 Samsung Electroncs Co., Ltd. Method of decoding/encoding content file
CN101779435A (zh) * 2007-08-08 2010-07-14 高通股份有限公司 分组数据汇聚协议报头中的密钥标识符

Also Published As

Publication number Publication date
WO2014123779A1 (en) 2014-08-14
JP2016508002A (ja) 2016-03-10
KR101734205B1 (ko) 2017-05-11
KR20150115874A (ko) 2015-10-14
EP2954636A1 (en) 2015-12-16
US20140223192A1 (en) 2014-08-07
CN104969508A (zh) 2015-10-07
US9298947B2 (en) 2016-03-29
JP6077678B2 (ja) 2017-02-08

Similar Documents

Publication Publication Date Title
CN104969508B (zh) 用于保护固定长度的数据结构的完整性的方法
CN112394877B (zh) 用于安全存储器的方法及其系统
CN112699383B (zh) 数据密码设备、存储器系统及其操作方法
CN111723383B (zh) 数据存储、验证方法及装置
US11755406B2 (en) Error identification in executed code
US11683155B2 (en) Validating data stored in memory using cryptographic hashes
EP2503482A1 (en) Electronic device with flash memory component
US20170060775A1 (en) Methods and architecture for encrypting and decrypting data
JP2022523294A (ja) 暗号化構成要素を備えたメモリデバイス
US11816202B2 (en) Run-time code execution validation
EP3948522A1 (en) Over-the-air update validation
CN120105490A (zh) 一种控制器数据访问方法、装置、设备及存储介质
US11228443B2 (en) Using memory as a block in a block chain
US12143519B2 (en) Using memory as a block in a block chain
CN120710691A (zh) 一种网络设备的安全启动方法及网络设备
WO2025025980A1 (zh) 数据加密方法、数据加密装置、电子设备
CN120110646A (zh) 一种基于国密算法的ssd可信启动方法、系统及存储介质
CN114547651A (zh) 一种基于链式加密的操作系统中断上下文保护方法

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180410

Termination date: 20190131