CN105681036A - Method and device for acquiring secret key - Google Patents

Method and device for acquiring secret key Download PDF

Info

Publication number
CN105681036A
CN105681036A CN201610135964.6A CN201610135964A CN105681036A CN 105681036 A CN105681036 A CN 105681036A CN 201610135964 A CN201610135964 A CN 201610135964A CN 105681036 A CN105681036 A CN 105681036A
Authority
CN
China
Prior art keywords
intermediate value
synopsis
seed
key
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610135964.6A
Other languages
Chinese (zh)
Other versions
CN105681036B (en
Inventor
杨春鹏
张健
瞿敏
黄新华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SAIC General Motors Corp Ltd
Pan Asia Technical Automotive Center Co Ltd
Original Assignee
SAIC General Motors Corp Ltd
Pan Asia Technical Automotive Center Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SAIC General Motors Corp Ltd, Pan Asia Technical Automotive Center Co Ltd filed Critical SAIC General Motors Corp Ltd
Priority to CN201610135964.6A priority Critical patent/CN105681036B/en
Publication of CN105681036A publication Critical patent/CN105681036A/en
Application granted granted Critical
Publication of CN105681036B publication Critical patent/CN105681036B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/068Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computational Linguistics (AREA)
  • Computer Hardware Design (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention provides a method and a device for acquiring a secret key. The method comprises the steps of: step (S00l), receiving a secret key generation instruction; step (the S002), acquiring seeds; step (S003), looking up first intermediate values corresponding to the seeds in a first comparison table, wherein the first comparison table comprises a plurality of the seeds having a sequential relationship and a plurality of the first intermediate values having no sequential relationship, and each seed corresponds to one of the first intermediate values; step (S004), and looking up second intermediate values corresponding to the first intermediate values in a second comparison table, wherein the second intermediate values are secret keys corresponding to the seeds, and the second comparison table comprises a plurality of the first intermediate values having no sequential relationship and a plurality of the second intermediate values having no sequential relationship. The method and the device provided by the invention solve the problem that a vehicle secret key can be cracked according to a seed of the vehicle in the prior art, make the vehicle safer, and accelerate the secret key generating speed by adopting the table lookup method.

Description

A kind of method and device obtaining key
Technical field
The present invention relates to key field, particularly relate to a kind of method and the device that obtain key.
Background technology
In recent years, China's automobile pollution improves rapidly, and car networking is day by day popularized, and the safety issue of In-vehicle networking becomes more and more important.
The vehicle electronics control module of vehicle, when programming, configure and learn, all needs correct key checking just can carry out, so the security of key is extremely important; Owing to the seed of different vehicles is all not identical with key, so the capacity of seed and key can not be too little.
In prior art, general employing 2 bytes go to preserve seed and key, cause the capacity of key very little, there will be the situation generation that different vehicles has same key, when calculating key according to seed in addition, general by once tabling look-up according to seed or calculates and then obtains key, causing key easily to crack, and vehicle is dangerous.
Therefore, it is necessary to overcome above-mentioned defect.
Summary of the invention
Based on above problem, the present invention proposes a kind of method obtaining key, by searching the first intermediate value corresponding to seed in the first synopsis, 2nd synopsis is searched the 2nd intermediate value that the first intermediate value is corresponding, 2nd intermediate value is key, increases the mode that seed produces the randomness in cipher key processes, makes attempt go the difficulty cracking vehicle key to increase according to the seed of vehicle, make vehicle key be not easy to be cracked, thus make vehicle also more safe; And make the formation speed of key become fast by the mode tabled look-up. The present invention also proposes a kind of device obtaining key.
The present invention proposes a kind of method obtaining key, comprising:
Step S001, comprising: receives and generates key instruction;
Step S002, comprising: obtain seed;
Step S003, comprise: in the first synopsis, search the first intermediate value that described seed is corresponding, described first synopsis comprises the multiple described seed with ordinal relation and multiple first intermediate values without ordinal relation, corresponding described first intermediate value of seed described in each;
Step S004, comprise: in the 2nd synopsis, search the 2nd intermediate value that described first intermediate value is corresponding, described 2nd intermediate value is the key that described seed is corresponding, described 2nd synopsis comprises multiple described first intermediate value without ordinal relation and multiple described 2nd intermediate value without ordinal relation, corresponding described 2nd intermediate value of the first intermediate value described in each.
Preferably, described step S001 also comprises, and receives the difference identification number of input, and described step S003 also comprises, and finds described first synopsis corresponding with it according to described difference identification number, described first synopsis that different described difference identification numbers is corresponding different.
Preferably, described step S001 also comprises, and receives the difference identification number of input, and described step S004 also comprises, and finds described 2nd synopsis corresponding with it according to described difference identification number, described 2nd synopsis that different described difference identification numbers is corresponding different.
Preferably, described step S001 also comprises, and receives the operational code of input;
Described step S003 also comprises, and according to described operational code, described first intermediate value is carried out logical operation and obtains logical operation intermediate value;
Described step S004 specifically comprises, described 2nd synopsis is searched the 2nd intermediate value that described logical operation intermediate value is corresponding, described 2nd intermediate value is the key that described seed is corresponding, described 2nd synopsis comprises the multiple described logical operation intermediate value without ordinal relation and multiple described 2nd intermediate value without ordinal relation, corresponding described 2nd intermediate value of logical operation intermediate value described in each.
Preferably, described in described step S004, the 2nd intermediate value obtains for described logical operation intermediate value and described operational code are carried out xor operation.
Preferably, the described seed in described step S002 is the seed of 5 bytes.
The present invention also proposes a kind of device obtaining key, comprising:
Receive instruction module, for: receive and generate key instruction;
Obtain seed module, for: obtain seed;
Search the first synopsis module, for: in the first synopsis, search the first intermediate value that described seed is corresponding, described first synopsis comprises the multiple described seed with ordinal relation and multiple first intermediate values without ordinal relation, corresponding described first intermediate value of seed described in each;
Search the 2nd synopsis module, for: in the 2nd synopsis, search the 2nd intermediate value that described first intermediate value is corresponding, described 2nd intermediate value is the key that described seed is corresponding, described 2nd synopsis comprises multiple described first intermediate value without ordinal relation and multiple described 2nd intermediate value without ordinal relation, corresponding described 2nd intermediate value of the first intermediate value described in each.
Preferably, described reception instruction module also comprises, and receives the difference identification number of input, described in search the first synopsis module and also comprise, described first synopsis corresponding with it is found, described first synopsis that different described difference identification numbers is corresponding different according to described difference identification number.
Preferably, described reception instruction module also comprises, and receives the difference identification number of input, described in search the 2nd synopsis module and also comprise, described 2nd synopsis corresponding with it is found, described 2nd synopsis that different described difference identification numbers is corresponding different according to described difference identification number.
Preferably, described reception instruction module also comprises, and receives the operational code of input;
Described first synopsis module of searching also comprises, and according to described operational code, described first intermediate value is carried out logical operation and obtains logical operation intermediate value;
Described the 2nd synopsis module of searching specifically comprises, described 2nd synopsis is searched the 2nd intermediate value that described logical operation intermediate value is corresponding, described 2nd intermediate value is the key that described seed is corresponding, described 2nd synopsis comprises the multiple described logical operation intermediate value without ordinal relation and multiple described 2nd intermediate value without ordinal relation, corresponding described 2nd intermediate value of logical operation intermediate value described in each.
Preferably, search the 2nd intermediate value described in the 2nd synopsis module described in obtain for described logical operation intermediate value and described operational code are carried out xor operation.
Preferably, the described seed in described acquisition seed module is the seed of 5 bytes.
By adopting technique scheme, there is following useful effect:
By searching the first intermediate value corresponding to seed in the first synopsis, 2nd synopsis is searched the 2nd intermediate value that the first intermediate value is corresponding, 2nd intermediate value is key, increase the mode that seed produces the randomness in cipher key processes, attempt is made to go the difficulty cracking vehicle key to increase according to the seed of vehicle, make vehicle key be not easy to be cracked, thus make vehicle also more safe; And make the formation speed of key become fast by the mode tabled look-up.
Accompanying drawing explanation
Fig. 1 is the schema of the method obtaining key according to an embodiment of the invention;
Fig. 2 is the schema of the method obtaining key according to an embodiment of the invention;
Fig. 3 is the block diagram of the device obtaining key according to an embodiment of the invention.
Embodiment
Below in conjunction with specific embodiments and accompanying drawing, the present invention is further described in detail. It is intended to elaborate specific embodiment of the invention scheme, and the present invention does not produce any restriction, and protection scope of the present invention is as the criterion with claim book.
With reference to Fig. 1, the present invention proposes a kind of method obtaining key, comprising:
Step S001, comprising: receives and generates key instruction; Step S002, comprising: obtain seed; Step S003, comprising: search the first intermediate value that seed is corresponding in the first synopsis, and the first synopsis comprises multiple seed with ordinal relation and multiple first intermediate values without ordinal relation, corresponding first intermediate value of each seed; Step S004, comprise: in the 2nd synopsis, search the 2nd intermediate value that the first intermediate value is corresponding, 2nd intermediate value is the key that seed is corresponding, 2nd synopsis comprises multiple first intermediate value without ordinal relation and multiple 2nd intermediate values without ordinal relation, corresponding 2nd intermediate value of each first intermediate value.
When automobile is when producing, obtaining to server high in the clouds in the seed of this automobile and electronically controlled unit ECU (ElectronicControlUnit) of key write vehicle, ECU is also known as " car running computer ", " vehicle-mounted computer " etc.
High in the clouds, obtaining seed and calculate according to seed in the process of key, first performs step S001, receives the generation key instruction that automobile is sent.
In step S002, high in the clouds obtains seed at random from seed bank, or generates regular random generation seed according to seed.
In step S003, first synopsis stores and multiple there is the seed of ordinal relation and multiple the first intermediate value without ordinal relation, corresponding first intermediate value of each seed, so first finding seed in the first synopsis, then the first intermediate value with seed corresponding stored is found, the use of the first intermediate value is as a middle area of a room, use for subsequent calculations key, in step S003, the kind subsequence that formed by multiple seed has ordinal relation should with the first intermediate value sequence pair without ordinal relation being made up of multiple first intermediate value, the sequence that one orderly is converted to unordered sequence, and by the mode adopting this kind to table look-up, the generation speed of key is accelerated.
In step S004, 2nd synopsis stores multiple the first intermediate value without ordinal relation and multiple the 2nd intermediate value without ordinal relation, each first intermediate value and a 2nd intermediate value corresponding stored, after finding the 2nd intermediate value according to the first intermediate value in the 2nd synopsis, namely 2nd intermediate value can be used as key and uses, should by a sequence without order being made up of multiple first intermediate value and a sequence pair without order being made up of multiple 2nd intermediate value in step S004, a sequence without order is converted to another sequence without order, add the difficulty of breaking cryptographic keys.
Step S001-S004 calculate key algorithm, can as required by programming and compile and is encapsulated in dll file, it may also be useful to this algorithm calculating key time, it is only necessary to perform this dll file and namely can obtain key. DLL (DynamicLinkLibrary) file is dynamic link library file, is scale-of-two file.
By searching the first intermediate value corresponding to seed in the first synopsis, 2nd synopsis is searched the 2nd intermediate value that the first intermediate value is corresponding, 2nd intermediate value is key, increase the mode that seed produces the randomness in cipher key processes, attempt is made to go the difficulty cracking vehicle key to increase according to the seed of vehicle, make vehicle key be not easy to be cracked, thus make vehicle also more safe; And make the formation speed of key become fast by the mode tabled look-up.
In an embodiment wherein, step S001 also comprises, and receives the difference identification number of input, and step S003 also comprises, and finds the first corresponding with it synopsis according to difference identification number, the first synopsis that different difference identification numbers is corresponding different.
Difference identification number comprises: vendor code and/or algorithm number, finds the first with it corresponding synopsis according to vendor code and/or algorithm number, different vendor codes and/or different the first synopsis of algorithm correspondence.
High in the clouds is when providing key to the vehicle of different suppliers, the first different synopsis can be used to carry out searching the first intermediate value, the benefit done like this is, user cannot according to the corresponding relation of the seed of the vehicle of the first supplier and key thus remove the seed of vehicle and the corresponding relation of vehicle of guessing the 2nd supplier, it is to increase vehicle safety; And different suppliers adopts the first different synopsis to manage, add the convenience of management.
Vehicle when sending acquisition key instruction to high in the clouds, supplier can be provided to encode (SupplierCode) and/or algorithm number (AlgorithmNo), and high in the clouds is gone to find the first corresponding synopsis according to supplier's coding and/or algorithm number simultaneously. Supplier is encoded to 1Bytes, maximum storage 255; Algorithm number is 1Bytes, maximum storage 255.
In an embodiment wherein, step S001 also comprises, and receives the difference identification number of input, and step S004 also comprises, and finds the 2nd corresponding with it synopsis according to difference identification number, the 2nd synopsis that different difference identification numbers is corresponding different.
High in the clouds is when providing key to the vehicle of different suppliers, the 2nd different synopsis can be used to carry out searching the 2nd intermediate value, the benefit done like this is, user cannot according to the corresponding relation of the seed of the vehicle of the first supplier and key thus remove the seed of vehicle and the corresponding relation of vehicle of guessing the 2nd supplier, it is to increase vehicle safety; And different suppliers adopts the 2nd different synopsis to manage, add the convenience of management.
Vehicle when sending acquisition key instruction to high in the clouds, supplier can be provided to encode (SupplierCode) and/or algorithm number (AlgorithmNo), and high in the clouds is gone to find the 2nd corresponding synopsis according to supplier's coding and/or algorithm number simultaneously.
In an embodiment wherein, in step S004, the 2nd intermediate value obtains for logical operation intermediate value and operational code are carried out xor operation. By this step, make the computation process randomization more of key, make key be difficult to crack.
In an embodiment wherein, the seed in step S002 is the seed of 5 bytes.
The capacity of seed determines the capacity of key, adopts seed to be 5 bytes in the present embodiment, and such as " DB3A6FFFDC ", so the maximum capacity that seed does not repeat is 1099511627775, the maximum capacity being also exactly key is 1099511627775.
By adopting 5 bytes as the storage space of seed, greatly expand the capacity of seed and key, make the electronic control module of different automobile can be configured to different seed double secret key, avoid in prior art owing to seed double secret key capacity is inadequate, make the electronic control module of different automobile may be configured the risk of same seed double secret key, improve the security of automobile, also ensure that the uniqueness of the seed double secret key of automobile, seed double secret key is made up of a seed and a key.
In an embodiment wherein, step S001 also comprises, and receives the operational code of input; Step S003 also comprises, and according to operational code, the first intermediate value is carried out logical operation and obtains logical operation intermediate value; Step S004 specifically comprises, 2nd synopsis is searched the 2nd intermediate value that logical operation intermediate value is corresponding, 2nd intermediate value is the key that seed is corresponding, 2nd synopsis comprises the multiple logical operation intermediate value without ordinal relation and multiple 2nd intermediate values without ordinal relation, corresponding 2nd intermediate value of each logical operation intermediate value.
Operational code (OperationCode) is participate in calculating the unique encodings in key algorithm computing by seed, and operational code is 5Bytes, and maximum storage is 1,099,511,627,775. Operational code is the data that high in the clouds receives vehicle end input. After receiving the operational code of input in step S001, in step S003, according to operational code, the first intermediate value being carried out logical operation, logical operation is such as shift operation, different or computing etc. By this step, make the computation process randomization more of key, make key be difficult to crack.
In an embodiment wherein, before step S003, also comprise and set up the first synopsis step, comprising: by there is ordinal relation multiple seed with the multiple first intermediate value corresponding stored without ordinal relation in two-dimensional array. By setting up the first synopsis in advance, make multiple seed with ordinal relation corresponding with multiple first intermediate values without ordinal relation, an orderly sequence is made to be converted to a unordered sequence, thus the difficulty that cracks making key increases, simultaneously, find key more a lot of soon than the mode speed with the use of formulae discovery by the mode tabled look-up, save key and produce the time.
In an embodiment wherein, before step S004, also comprise and set up the 2nd synopsis step, comprising: by multiple first intermediate value without ordinal relation with multiple 2nd intermediate value corresponding stored without ordinal relation in two-dimensional array. Make an orderly sequence be converted to a unordered sequence, thus the difficulty that cracks making key increases, meanwhile, find key than by adopting the mode speed of formulae discovery key a lot of soon by the mode tabled look-up, save key and produce the time.
With reference to Fig. 2, as the most preferred embodiment of the present invention, the mode of key is found to achieve the generation of key by lookup table.
Step S201, high in the clouds generates the first synopsis and the 2nd synopsis, and the first different synopsis and the 2nd different synopsis is generated for different supplier's coded numbers, first synopsis comprises multiple seed with ordinal relation and multiple first intermediate values without ordinal relation, corresponding first intermediate value of each seed, 2nd synopsis comprises multiple first intermediate value without ordinal relation and multiple 2nd intermediate values without ordinal relation, corresponding 2nd intermediate value of each first intermediate value;
Step S202, receives generation key instruction, supplier's coding, algorithm number and operational code that automobile end sends to cloud server;
Step S203, the random seed obtaining 5 bytes, such as 0xC308FA23F0;
Step S204, finds the first corresponding with it synopsis according to supplier's coding, searches the first synopsis, and the first synopsis is as shown in table 1, and in the first synopsis, the first intermediate value finding seed 0xC308FA23F0 corresponding is 0x07FE009A38;
Step S205, carries out shift operation to the first intermediate value, and such as the first intermediate value is 0xF1F2F3F4F5, is 0xF3F4F1F2F5 after shift operation, and this value carries out step-by-step negate operation, and obtaining logical operation intermediate value is 0x0C0B0E0D0A;
Step S206, finds the 2nd corresponding with it synopsis according to supplier's coding, in the 2nd synopsis, finds two intermediate value corresponding with logical operation intermediate value, be 0x07FE009A38;
Step S207, carries out different or computing to the 2nd intermediate value and operational code, and obtaining final key is 0x0BD50E9732.
Seed 0xC308FA23F0 and key 0BD50E9732 is one pair of seed double secret key.
Seed Key
0X0000000000 0X003D0F0043
0X0000000001 0XE30925EE00
…… ……
0XC308FA23F0 0X07FE009A38
…… ……
0XFFFFFFFFFE 0X89000C2B3E
0XFFFFFFFFFF 0XFF3FFFBF0E
Table 1
With reference to Fig. 3, the present invention also proposes a kind of device obtaining key, comprising:
Receive instruction module 301, for: receive and generate key instruction;
Obtain seed module 302, for: obtain seed;
Search the first synopsis module 303, for: in the first synopsis, search the first intermediate value that seed is corresponding, first synopsis comprises multiple seed with ordinal relation and multiple first intermediate values without ordinal relation, corresponding first intermediate value of each seed;
Search the 2nd synopsis module 304, for: in the 2nd synopsis, search the 2nd intermediate value that the first intermediate value is corresponding, 2nd intermediate value is the key that seed is corresponding, 2nd synopsis comprises multiple first intermediate value without ordinal relation and multiple 2nd intermediate values without ordinal relation, corresponding 2nd intermediate value of each first intermediate value.
In an embodiment wherein, receive instruction module 301 also to comprise, receive the difference identification number of input, search the first synopsis module and also comprise, the first corresponding with it synopsis is found, the first synopsis that different difference identification numbers is corresponding different according to difference identification number.
In an embodiment wherein, receive instruction module 301 also to comprise, receive the difference identification number of input, search the 2nd synopsis module and also comprise, the 2nd corresponding with it synopsis is found, the 2nd synopsis that different difference identification numbers is corresponding different according to difference identification number.
In an embodiment wherein, receive instruction module 301 and also comprise, receive the operational code of input;
Search the first synopsis module 303 also to comprise, according to operational code, the first intermediate value is carried out logical operation and obtain logical operation intermediate value;
Search the 2nd synopsis module 304 specifically to comprise, 2nd synopsis is searched the 2nd intermediate value that logical operation intermediate value is corresponding, 2nd intermediate value is the key that seed is corresponding, 2nd synopsis comprises the multiple logical operation intermediate value without ordinal relation and multiple 2nd intermediate values without ordinal relation, corresponding 2nd intermediate value of each logical operation intermediate value.
In an embodiment wherein, search the 2nd intermediate value in the 2nd synopsis module 304 and obtain for logical operation intermediate value and operational code are carried out xor operation.
In an embodiment wherein, the seed obtained in seed module 302 is the seed of 5 bytes.
In an embodiment wherein, device also comprises sets up the first synopsis module, for: by there is ordinal relation multiple seed with the multiple first intermediate value corresponding stored without ordinal relation in two-dimensional array.
In an embodiment wherein, device also comprises sets up the 2nd synopsis module, for: by multiple first intermediate value without ordinal relation with multiple 2nd intermediate value corresponding stored without ordinal relation in two-dimensional array.
Above-described is only principle and the preferred embodiment of the present invention. It is noted that for the person of ordinary skill of the art, on the basis of the principle of the invention, it is also possible to make other modification some, protection scope of the present invention should be also considered as.

Claims (12)

1. one kind obtains the method for key, it is characterised in that, comprising:
Step (S001), comprising: receives and generates key instruction;
Step (S002), comprising: obtain seed;
Step (S003), comprise: in the first synopsis, search the first intermediate value that described seed is corresponding, described first synopsis comprises the multiple described seed with ordinal relation and multiple first intermediate values without ordinal relation, corresponding described first intermediate value of seed described in each;
Step (S004), comprise: in the 2nd synopsis, search the 2nd intermediate value that described first intermediate value is corresponding, described 2nd intermediate value is the key that described seed is corresponding, described 2nd synopsis comprises multiple described first intermediate value without ordinal relation and multiple described 2nd intermediate value without ordinal relation, corresponding described 2nd intermediate value of the first intermediate value described in each.
2. method according to claim 1, it is characterised in that:
Described step (S001) also comprises, receive the difference identification number of input, described step (S003) also comprises, and finds described first synopsis corresponding with it according to described difference identification number, described first synopsis that different described difference identification numbers is corresponding different.
3. method according to claim 1, it is characterised in that:
Described step (S001) also comprises, receive the difference identification number of input, described step (S004) also comprises, and finds described 2nd synopsis corresponding with it according to described difference identification number, described 2nd synopsis that different described difference identification numbers is corresponding different.
4. method according to claim 1, it is characterised in that:
Described step (S001) also comprises, and receives the operational code of input;
Described step (S003) also comprises, and according to described operational code, described first intermediate value is carried out logical operation and obtains logical operation intermediate value;
Described step (S004) specifically comprises, described 2nd synopsis is searched the 2nd intermediate value that described logical operation intermediate value is corresponding, described 2nd intermediate value is the key that described seed is corresponding, described 2nd synopsis comprises the multiple described logical operation intermediate value without ordinal relation and multiple described 2nd intermediate value without ordinal relation, corresponding described 2nd intermediate value of logical operation intermediate value described in each.
5. method according to claim 4, it is characterised in that:
Described in described step (S004), the 2nd intermediate value obtains for described logical operation intermediate value and described operational code are carried out xor operation.
6. method according to the arbitrary item of claim 1 to 5, it is characterised in that:
Described seed in described step (S002) is the seed of 5 bytes.
7. one kind obtains the device of key, it is characterised in that, comprising:
Receive instruction module, for: receive and generate key instruction;
Obtain seed module, for: obtain seed;
Search the first synopsis module, for: in the first synopsis, search the first intermediate value that described seed is corresponding, described first synopsis comprises the multiple described seed with ordinal relation and multiple first intermediate values without ordinal relation, corresponding described first intermediate value of seed described in each;
Search the 2nd synopsis module, for: in the 2nd synopsis, search the 2nd intermediate value that described first intermediate value is corresponding, described 2nd intermediate value is the key that described seed is corresponding, described 2nd synopsis comprises multiple described first intermediate value without ordinal relation and multiple described 2nd intermediate value without ordinal relation, corresponding described 2nd intermediate value of the first intermediate value described in each.
8. device according to claim 7, it is characterised in that:
Described reception instruction module also comprises, receive the difference identification number of input, described first synopsis module of searching also comprises, and finds described first synopsis corresponding with it according to described difference identification number, described first synopsis that different described difference identification numbers is corresponding different.
9. device according to claim 7, it is characterised in that:
Described reception instruction module also comprises, receive the difference identification number of input, described the 2nd synopsis module of searching also comprises, and finds described 2nd synopsis corresponding with it according to described difference identification number, described 2nd synopsis that different described difference identification numbers is corresponding different.
10. device according to claim 7, it is characterised in that:
Described reception instruction module also comprises, and receives the operational code of input;
Described first synopsis module of searching also comprises, and according to described operational code, described first intermediate value is carried out logical operation and obtains logical operation intermediate value;
Described the 2nd synopsis module of searching specifically comprises, described 2nd synopsis is searched the 2nd intermediate value that described logical operation intermediate value is corresponding, described 2nd intermediate value is the key that described seed is corresponding, described 2nd synopsis comprises the multiple described logical operation intermediate value without ordinal relation and multiple described 2nd intermediate value without ordinal relation, corresponding described 2nd intermediate value of logical operation intermediate value described in each.
11. devices according to claim 10, it is characterised in that:
Described search the 2nd intermediate value described in the 2nd synopsis module and obtain for described logical operation intermediate value and described operational code are carried out xor operation.
12. devices according to the arbitrary item of claim 7 to 11, it is characterised in that:
Described seed in described acquisition seed module is the seed of 5 bytes.
CN201610135964.6A 2016-03-10 2016-03-10 A kind of method and apparatus obtaining key Active CN105681036B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610135964.6A CN105681036B (en) 2016-03-10 2016-03-10 A kind of method and apparatus obtaining key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610135964.6A CN105681036B (en) 2016-03-10 2016-03-10 A kind of method and apparatus obtaining key

Publications (2)

Publication Number Publication Date
CN105681036A true CN105681036A (en) 2016-06-15
CN105681036B CN105681036B (en) 2018-12-04

Family

ID=56307505

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610135964.6A Active CN105681036B (en) 2016-03-10 2016-03-10 A kind of method and apparatus obtaining key

Country Status (1)

Country Link
CN (1) CN105681036B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1694397A (en) * 2004-05-08 2005-11-09 侯方勇 Method and device for constructing sequential cipher
CN1832394A (en) * 2005-03-07 2006-09-13 微软公司 Method and system for personal identity verification with secrecy
CN1832396A (en) * 2005-11-07 2006-09-13 北京浦奥得数码技术有限公司 Pseudo-random number generation method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1694397A (en) * 2004-05-08 2005-11-09 侯方勇 Method and device for constructing sequential cipher
CN1832394A (en) * 2005-03-07 2006-09-13 微软公司 Method and system for personal identity verification with secrecy
CN1832396A (en) * 2005-11-07 2006-09-13 北京浦奥得数码技术有限公司 Pseudo-random number generation method

Also Published As

Publication number Publication date
CN105681036B (en) 2018-12-04

Similar Documents

Publication Publication Date Title
CN104836669B (en) A kind of safety certifying method and a kind of terminal, Verification System based on SRAM PUF
CN101038619B (en) Radio frequency recognition system privacy identification method
US9960915B2 (en) Method and apparatus for performing cross-authentication based on secret information
US20150207790A1 (en) Method and system for generating and authorizing dynamic password
EP3563516B1 (en) Pseudo-random generation of matrices for a computational fuzzy extractor and method for authentication
CN103716164B (en) A kind of RFID mutual authentication method of extra lightweight
CN103856499A (en) Cloud storage method, cloud storage device, cloud storage data downloading method and cloud storage data downloading device
CN103905202A (en) RFID lightweight class bidirectional authentication method based on PUF
US20150333766A1 (en) Run time compression method for a vehicle communication bus
CN103886659B (en) Electronic security equipment and control method thereof
CN110489466B (en) Method and device for generating invitation code, terminal equipment and storage medium
CN104468579A (en) Authentication system suitable for distributed storage
CN105323069B (en) A kind of authentication method and equipment based on PUF
CN103345690A (en) Anti-fake method based on RFID and physical unclonable function
CN109903450B (en) Electronic voting method and system
CN112487253B (en) User invitation code generation method, verification method, device, equipment and storage medium
Jeon et al. Design of an LPWAN communication module based on secure element for smart parking application
CN104579686B (en) A kind of seed matching process for handset token
Luo et al. A more efficient leveled strongly-unforgeable fully homomorphic signature scheme
CN111723360B (en) Credential code processing method, device and storage medium
CN104468580A (en) Authentication method suitable for distributed storage
CN106062749A (en) Providing prevalence information using query data
CN103326861A (en) Method and device for conducting RSA safety signing on data and safety chip
CN107294705B (en) Method, device and system for generating and verifying key
CN103546281A (en) Dynamic secret key generating method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant