CN107465503A - A kind of method of the safe storage chip cryptographic algorithm correctness of fast verification - Google Patents
A kind of method of the safe storage chip cryptographic algorithm correctness of fast verification Download PDFInfo
- Publication number
- CN107465503A CN107465503A CN201710601406.9A CN201710601406A CN107465503A CN 107465503 A CN107465503 A CN 107465503A CN 201710601406 A CN201710601406 A CN 201710601406A CN 107465503 A CN107465503 A CN 107465503A
- Authority
- CN
- China
- Prior art keywords
- algorithm
- data
- encryption
- normal data
- chip
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
A kind of method of the safe storage chip cryptographic algorithm correctness of fast verification of the present invention, host computer connectivity verification machine, algorithm standard rules database is established in verification machine, polytype algorithm is stored in the algorithm standard rules database, each type of algorithm is all corresponding to store the checking data that normal data and the normal data are drawn after the algorithm for encryption;Selection needs the algorithm types verified from algorithm standard rules database, and travels through the algorithm types, normal data corresponding to selection and checking data.Host computer is by generation data that testing encryption chip returns compared with the checking data selected in step 1.The beneficial effects of the invention are as follows:Correctness of the invention by verifying cryptographic algorithm, the safety coefficient of storage device is improved, ensure integrality, accuracy, the privacy of encryption data in storage device.
Description
Technical field
The present invention relates to a kind of method of the safe storage chip cryptographic algorithm correctness of fast verification.
Background technology
At present, with the development of information technology, people start to pay close attention to information security gradually, especially in the U.S. " prism " door
After event, either country, enterprise are still personal, all more recognize the importance of information security.Then it is various that there is peace
The storage chip or equipment of full encryption function are widely used.The integrated AES of safe storage chip is increasing, state's familia
Prestige mechanism is often expending the several months to chip cryptographic algorithm verification process, so how during the iterative development of product, carries
This problem of high password proof of algorithm efficiency is just put in face of safety chip company.
The content of the invention
For technical deficiency more than solving, the invention provides a kind of safe storage chip of fast verification and its equipment
Encryption function, ensure integrality, accuracy, the privacy of encryption data in storage device.
The present invention is achieved by the following measures:
A kind of method of the safe storage chip cryptographic algorithm correctness of fast verification of the present invention, comprises the following steps:
Step 1, host computer connectivity verification machine, algorithm standard rules database is established in verification machine, is deposited in the algorithm standard rules database
Store up polytype algorithm, each type of algorithm is all corresponding to store normal data and the normal data adds by the algorithm
The checking data drawn after close;Selection needs the algorithm types verified from algorithm standard rules database, and travels through the algorithm types,
Normal data corresponding to selection and checking data;
Step 2, the storage device equipped with testing encryption chip is connected by USB or SATA interface with verifier, verified
Machine sends operational order and normal data according to USB or SATA protocol to the storage device;
Step 3, after testing encryption chip receives operational order and normal data, the normal data is encrypted, and will encryption
The generation data obtained afterwards are back to verification machine;
Step 4, host computer by generation data that testing encryption chip returns compared with the checking data selected in step 1,
If both are identical, prove that testing encryption chip has encryption function and meets AES standard;If both differ,
Then prove that testing encryption chip does not possess perfect encryption function.
Batch validation program is set in above-mentioned host computer, generation data are completed with verifying the comparison of data for batch.
The beneficial effects of the invention are as follows:Correctness of the invention by verifying cryptographic algorithm, improve the safety of storage device
Coefficient, ensure integrality, accuracy, the privacy of encryption data in storage device.The AES of current industry main flow is supported,
The batch validation of cryptographic algorithm test data is supported, improves the comprehensive of checking safety storage apparatus cryptographic algorithm.By with
The cooperation of python scripts, QTP automated test tools, it is possible to achieve the automated execution of cryptographic algorithm correctness, subtract
Few proving period, it is possible to increase the efficiency of checking cryptographic algorithm correctness and the degree of accuracy.
Embodiment
A kind of method of the safe storage chip cryptographic algorithm correctness of fast verification of the present invention, comprises the following steps:
Step 1, host computer connectivity verification machine, algorithm standard rules database is established in verification machine, is deposited in the algorithm standard rules database
Store up polytype algorithm, each type of algorithm is all corresponding to store normal data and the normal data adds by the algorithm
The checking data drawn after close;Selection needs the algorithm types verified from algorithm standard rules database, and travels through the algorithm types,
Normal data corresponding to selection and checking data;Such as initial value, key, plaintext, ciphertext etc..
Step 2, the storage device equipped with testing encryption chip is connected by USB or SATA interface with verifier,
Verification machine sends operational order and normal data according to USB or SATA protocol to the storage device;
Step 3, after testing encryption chip receives operational order and normal data, the normal data is encrypted, and will encryption
The generation data obtained afterwards are back to verification machine;
Step 4, host computer by generation data that testing encryption chip returns compared with the checking data selected in step 1,
If both are identical, prove that testing encryption chip has encryption function and meets AES standard;If both differ,
Then prove that testing encryption chip does not possess perfect encryption function.Batch validation program is set in host computer, for completing in batches
Data are generated with verifying the comparison of data.
Due to safe storage chip and its USB2.0/ of the interface type of equipment difference, at this stage main compatible main flow
USB3.0 interfaces and SATA2/SATA3 interfaces.According to national cryptographic algorithm standard and international various cryptographic algorithm standards, phase is extracted
Answer multigroup criterion numeral of algorithm(That is key and plaintext and its corresponding ciphertext), as we judge safe storage chip and its
Equipment possesses data encryption feature and meets the foundation of cryptographic algorithm standard, formation algorithm criterion numeral storehouse.
For convenience of various cryptographic algorithm batch validations, the batch validation journey of safe storage chip and its equipment has been designed and developed
Sequence.It with the various cryptographic algorithms supported in automatic Verification chip and can form checking report, convenient that the result is looked into
Read.
The verification step of cryptographic algorithm is exemplified by verifying data encryption feature:We are according to safe storage chip and its equipment
The encryption algorithm type of support, select key and plaintext in respective algorithms criterion numeral, by USB or SATA interface by key and
It is sent to safe storage chip in plain text.Then the data after being encrypted in safe storage chip are read by USB or SATA interface again
Take out.Finally the ciphertext in the data and criterion numeral of reading is contrasted again.So as to judge this safe storage chip and its
Equipment whether has encryption function and encryption method meets corresponding standard.
Described above is only the preferred embodiment of this patent, it is noted that for the ordinary skill people of the art
For member, on the premise of the art of this patent principle is not departed from, some improvement and replacement can also be made, these improve and replaced
Also it should be regarded as the protection domain of this patent.
Claims (2)
- A kind of 1. method of the safe storage chip cryptographic algorithm correctness of fast verification, it is characterised in that comprise the following steps:Step 1, host computer connectivity verification machine, algorithm standard rules database is established in verification machine, is deposited in the algorithm standard rules database Store up polytype algorithm, each type of algorithm is all corresponding to store normal data and the normal data adds by the algorithm The checking data drawn after close;Selection needs the algorithm types verified from algorithm standard rules database, and travels through the algorithm types, Normal data corresponding to selection and checking data;Step 2, the storage device equipped with testing encryption chip is connected by USB or SATA interface with verifier, verified Machine sends operational order and normal data according to USB or SATA protocol to the storage device;Step 3, after testing encryption chip receives operational order and normal data, the normal data is encrypted, and will encryption The generation data obtained afterwards are back to verification machine;Step 4, host computer by generation data that testing encryption chip returns compared with the checking data selected in step 1, If both are identical, prove that testing encryption chip has encryption function and meets AES standard;If both differ, Then prove that testing encryption chip does not possess perfect encryption function.
- 2. the method for the safe storage chip cryptographic algorithm correctness of fast verification according to claim 1, it is characterised in that:Institute Setting batch validation program in host computer is stated, generation data are completed with verifying the comparison of data for batch.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710601406.9A CN107465503A (en) | 2017-07-21 | 2017-07-21 | A kind of method of the safe storage chip cryptographic algorithm correctness of fast verification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710601406.9A CN107465503A (en) | 2017-07-21 | 2017-07-21 | A kind of method of the safe storage chip cryptographic algorithm correctness of fast verification |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107465503A true CN107465503A (en) | 2017-12-12 |
Family
ID=60546358
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710601406.9A Pending CN107465503A (en) | 2017-07-21 | 2017-07-21 | A kind of method of the safe storage chip cryptographic algorithm correctness of fast verification |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107465503A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111262700A (en) * | 2020-01-13 | 2020-06-09 | 中孚信息股份有限公司 | Communication method and device for high-speed SATA interface cryptographic module |
CN114285584A (en) * | 2021-12-22 | 2022-04-05 | 北京正奇盾数据安全技术有限公司 | Encryption algorithm experimental system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103647648A (en) * | 2013-12-10 | 2014-03-19 | 飞天诚信科技股份有限公司 | Safety communication method |
CN103678065A (en) * | 2013-12-10 | 2014-03-26 | 深圳市新国都技术股份有限公司 | Method for testing code keyboard and code keyboard test machine |
US20140089204A1 (en) * | 2007-01-16 | 2014-03-27 | Voltage Security, Inc. | Format-preserving cryptographic systems |
CN105303093A (en) * | 2014-07-04 | 2016-02-03 | 上海交通大学深圳研究院 | Token verification method for cryptographic smart token |
CN106209344A (en) * | 2016-06-30 | 2016-12-07 | 宇龙计算机通信科技(深圳)有限公司 | The method of testing of a kind of voice encryption and test equipment |
-
2017
- 2017-07-21 CN CN201710601406.9A patent/CN107465503A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140089204A1 (en) * | 2007-01-16 | 2014-03-27 | Voltage Security, Inc. | Format-preserving cryptographic systems |
CN103647648A (en) * | 2013-12-10 | 2014-03-19 | 飞天诚信科技股份有限公司 | Safety communication method |
CN103678065A (en) * | 2013-12-10 | 2014-03-26 | 深圳市新国都技术股份有限公司 | Method for testing code keyboard and code keyboard test machine |
CN105303093A (en) * | 2014-07-04 | 2016-02-03 | 上海交通大学深圳研究院 | Token verification method for cryptographic smart token |
CN106209344A (en) * | 2016-06-30 | 2016-12-07 | 宇龙计算机通信科技(深圳)有限公司 | The method of testing of a kind of voice encryption and test equipment |
Non-Patent Citations (1)
Title |
---|
汪圣莅等: "智能密码钥匙合规性检测系统的实现", 《信息安全与通信保密》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111262700A (en) * | 2020-01-13 | 2020-06-09 | 中孚信息股份有限公司 | Communication method and device for high-speed SATA interface cryptographic module |
CN114285584A (en) * | 2021-12-22 | 2022-04-05 | 北京正奇盾数据安全技术有限公司 | Encryption algorithm experimental system |
CN114285584B (en) * | 2021-12-22 | 2024-01-16 | 北京正奇盾数据安全技术有限公司 | Encryption algorithm experiment system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20240171553A1 (en) | Systems and methods for creating fingerprints of encryption devices | |
CN102158488B (en) | Dynamic countersign generation method and device and authentication method and system | |
CN104683354B (en) | A kind of dynamic password system based on mark | |
JP5964077B2 (en) | Control program management system and control program change method | |
US10069860B1 (en) | Protection for computing systems from revoked system updates | |
US20210350372A1 (en) | Tap card to securely generate card data to copy to clipboard | |
US20160227413A1 (en) | Terminal, Network Locking and Network Uunlocking Method for Same, and Storage Medium | |
CN110175466A (en) | Method for managing security, device, computer equipment and the storage medium of open platform | |
CN106296177A (en) | Data processing method based on bank's Mobile solution and equipment | |
CN107465503A (en) | A kind of method of the safe storage chip cryptographic algorithm correctness of fast verification | |
CN107092838A (en) | A kind of safety access control method of hard disk and a kind of hard disk | |
CN106997533B (en) | POS terminal product safety production authorization management system and method | |
CN101552671A (en) | Network identity authentication method based on U-disk and dynamic differential password and system thereof | |
CN102289607A (en) | Universal serial bus (USB) device verification system and method | |
CN112825093B (en) | Security baseline checking method, host, server, electronic device and storage medium | |
CN112910886A (en) | Method and system for verifying identity of lock | |
CN110502360A (en) | A kind of method of Advanced Encryption Standard coprocessor self-test | |
CN109543397A (en) | A kind of encryption authorization scheme of algorithms library | |
CN105701402B (en) | A kind of method and apparatus that monitoring and displaying is kidnapped | |
CN104240387A (en) | Method and system for processing bank card transaction | |
CN117892279B (en) | Computer system encryption method for software development | |
CN102890786A (en) | Password technology-based metering seal anti-counterfeiting method | |
CN109660355B (en) | Method, device, storage medium and terminal for preventing POS terminal from being illegally tampered | |
CN107018148A (en) | User logs in control method and device | |
CN113364583A (en) | Remote verification method based on decentralized network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171212 |