CN110233729B - Encrypted solid-state disk key management method based on PUF - Google Patents

Encrypted solid-state disk key management method based on PUF Download PDF

Info

Publication number
CN110233729B
CN110233729B CN201910587599.6A CN201910587599A CN110233729B CN 110233729 B CN110233729 B CN 110233729B CN 201910587599 A CN201910587599 A CN 201910587599A CN 110233729 B CN110233729 B CN 110233729B
Authority
CN
China
Prior art keywords
state disk
solid
key
ukey
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910587599.6A
Other languages
Chinese (zh)
Other versions
CN110233729A (en
Inventor
冯志华
罗重
赵霞
安东博
梁书铭
邓威
习亮
郭慧波
宋峙峰
曲新春
万星
余艺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Computer Technology and Applications
Original Assignee
Beijing Institute of Computer Technology and Applications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Computer Technology and Applications filed Critical Beijing Institute of Computer Technology and Applications
Priority to CN201910587599.6A priority Critical patent/CN110233729B/en
Publication of CN110233729A publication Critical patent/CN110233729A/en
Application granted granted Critical
Publication of CN110233729B publication Critical patent/CN110233729B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token

Abstract

The invention relates to a cryptographic solid-state disk key management method based on PUF, which comprises the following steps: powering on the host computer, and performing bios self-checking; and the safety UKey verifies the identity of the encrypted solid-state disk, the user verifies the password, and if the password is verified, the password hash value and the threshold key component are sent to the encrypted solid-state disk, and the encrypted solid-state disk verifies the identity of the safety UKey. The invention introduces the use of PUF in the hierarchical management of the key and the mutual authentication of the key. A threshold encryption algorithm is introduced in the key management process, data key ciphertexts are respectively stored in a safe UKey and a solid-state disk after being decomposed, and a complete data key cannot be recovered when any party is stolen. The key interactive authentication adopts the PUF value electrically generated by the built-in PUF module of the encryption solid-state disk as an authentication core trust root, and the authentication security and reliability are stronger.

Description

Encrypted solid-state disk key management method based on PUF
Technical Field
The invention relates to the technical field of information security, in particular to a PUF-based encrypted solid-state disk key management method.
Background
As a common way for protecting sensitive information for enterprises and individual users, an encryption solid-state disk has a key management scheme which is a core part of the whole security system, and the theft of keys will cause the collapse of the whole security system.
The existing key storage scheme for the encrypted solid-state disk mainly adopts a multi-level key management mode and protects the key in a multi-level management and control mode. However, whether the key is stored on a UKey, a solid-state disk, or other single storage medium, once the device storing the key is stolen, the key is read, and risk of data theft is encountered. The idea of the threshold encryption scheme (t, n) is to divide the secret into n parts of shadows, distribute the shadows to n participants, and recover the key by the cooperation of any participants more than or equal to t. The threshold scheme is applied to the key management of the encrypted solid-state disk, so that the security risk can be dispersed, and the data security is ensured.
The authentication methods of the existing key management schemes mainly include the following two types: the authentication mode of the public and private key pair is that the public and private key pair is distributed to both authentication parties, and whether the public and private key pair is legal or not is verified by verifying whether the public and private key pair is matched or not during authentication handshake, so that the problems that the consumed resources are overlarge and a third-party key distribution center is required to be introduced exist; the authentication mode of the symmetric algorithm is that whether the key and the algorithm of the two parties are the same or not is verified to verify whether the key and the algorithm of the two parties are legal or not during authentication handshake through the common symmetric cryptographic algorithm and the same key of the two parties, and the problem exists that the two parties face the problem of key storage, and once the authentication key is stolen, a security system is broken.
Disclosure of Invention
The present invention aims to provide a PUF-based encrypted solid-state disc key management method, which is used to solve the above-mentioned problems of the prior art.
The invention discloses a PUF-based encrypted solid-state disk key management method, which comprises the following steps: powering on the host computer, and performing bios self-checking; the safety UKey verifies the identity of the encrypted solid-state disk, the user verifies the password, and the password hash value and the threshold key component are sent to the encrypted solid-state disk after the verification is passed, and the encrypted solid-state disk verifies the safety UKey identity, which comprises the following steps: the safety UKey generates a random number a and sends hash values K and a to the encryption solid-state disk; the encryption solid-state disk receives the hash values K and a and generates a random number b; the XOR K and the PUF value P generate N, the encryption solid-state disk calculates N by using a hash algorithm to generate N, the encryption solid-state disk encrypts a by using N as a key to generate A by using a symmetric cryptographic algorithm X, and A and b are sent to a secure Ukey; the safety UKey receives A and decrypts A by using the stored N as a secret key to generate a'; checking whether the decryption result is consistent with the generated a, and if so, considering the encrypted solid-state disk to be credible by the safety UKey; b is generated by encrypting B by using N as a key and a symmetric cryptographic algorithm X, and B and a threshold key component E2 are sent to an encrypted solid-state disk; the user inputs the password K ', calculates the hash value K ' of the password K ', checks whether the calculation result is consistent with the password hash value K stored in the safety UKey, and if so, the user identity is considered to be legal; sending K' to the encrypted solid-state disk; the encrypted solid-state disk receives B and K ', XOR K ' and PUF value P to generate N ', the encrypted solid-state disk uses a hash algorithm to calculate N ' to generate N ', the encrypted solid-state disk uses a symmetric cryptographic algorithm X, and the N ' is used as a key to decrypt B to generate B ', whether a decryption result is in accordance with B is checked, and if the decryption result is in accordance with B, the encrypted solid-state disk considers that the UKey is safe and credible; and the encrypted solid-state disk recovers the data key, decrypts the data in the disk and starts the system.
An embodiment of the method for managing the encryption solid-state disk key according to the present invention further includes: the method comprises the steps of binding a security Ukey and an encryption solid-state disk one by one in a security environment for the first time, setting a password K by a user, calculating a hash value K of the password K, calculating a combined value N of the password value K and an encryption solid-state disk PUF value P, calculating a hash value N of the combined value N by the encryption solid-state disk through a hash algorithm, and storing the hash value N and the user password hash value K by the security Ukey.
According to an embodiment of the encrypted solid-state disk key management method of the present invention, an encrypted solid-state disk PUF value P is used as a root key, a symmetric encryption algorithm Y is used, a data key E is encrypted with the PUF value P, a data key ciphertext E is generated, the data key ciphertext E is decomposed with a threshold algorithm, a part of the threshold data key ciphertext E1 is stored in the solid-state disk, and a part of the threshold data key ciphertext E2 is stored in the secure UKey.
According to an embodiment of the method for managing the key of the encrypted solid-state disk, the total threshold key component number is n, when the threshold key component number is greater than or equal to a threshold t, a complete data key ciphertext can be solved, the data key component number x < t stored in the secure UKey, the data key component number y < t, x + y > t stored in the encrypted solid-state disk, and the secure Ukey and the key components in the encrypted solid-state disk need to be acquired to recover the complete data key ciphertext.
According to an embodiment of the method for managing the key of the encrypted solid-state disk, after the encrypted solid-state disk verifies the identity of the secure UKey, the encrypted solid-state disk uses a threshold algorithm to synthesize the self-stored threshold data key ciphertext component E1 and the received threshold data key ciphertext component E2 from the secure UKey into a complete data key ciphertext E, the encrypted solid-state disk uses a symmetric encryption algorithm Y, and the PUF value is used as the key to decrypt the data key ciphertext E to obtain the data key plaintext E.
The invention makes full use of the physical unclonable nature of PUF values. In the authentication process, an encrypted solid-state disk PUF value is used as a credible core of security authentication, and a brand-new authentication handshake method is designed by combining a hash algorithm and a symmetric encryption algorithm. Compared with public and private key pair authentication, the method has the advantages of less resource consumption and higher computing speed. Compared with the traditional symmetric algorithm authentication disk end, the authentication key does not need to be stored, the reliability of mutual authentication of the UKey and the encrypted solid-state disk after the binding is ensured by the physical unclonable characteristic of the PUF value, and the safety and the reliability of the authentication process are integrally improved by the method.
Drawings
Fig. 1 is a schematic diagram illustrating a security mode of a PUF-based encryption solid-state disc key management method;
FIG. 2 is an authentication flow diagram of a PUF-based encrypted solid-state disk key management method;
fig. 3 is a key structure diagram of a PUF-based encryption solid-state disc key management method.
Detailed Description
In order to make the objects, contents, and advantages of the present invention clearer, the following detailed description of the embodiments of the present invention will be made in conjunction with the accompanying drawings and examples.
Fig. 1 is a schematic diagram illustrating a security mode of a PUF-based encryption solid-state disk key management method, and fig. 2 is an authentication flow chart of the PUF-based encryption solid-state disk key management method; fig. 3 is a key structure diagram of a PUF-based encryption solid-state disk key management method, as shown in fig. 1 to 3, a PUF-based encryption solid-state disk key management method includes:
(1) powering on the host computer, and performing bios self-checking;
(2) the safety UKey verifies the identity of the encrypted solid-state disk;
(3) the user verifies the password, and if the password passes the verification, the password hash value and the threshold key component are sent to the encrypted solid-state disk;
(4) the encrypted solid-state disk verifies the identity of the safe UKey;
(5) and if the verification is passed, the solid-state disk is encrypted to recover the data key, the data in the disk is decrypted, and the system is started.
As shown in fig. 1 to fig. 3, initialization is required before use, that is, the secure Ukey and the encrypted solid-state disk are bound one by one in the secure environment for the first time. The method comprises the steps that a user sets a password K, calculates a hash value K of the password K, and calculates a combined value N of the password value K and a PUF value P of an encrypted solid-state disk, the combining method can be exclusive OR or splicing, the encrypted solid-state disk uses a hash algorithm to calculate the hash value N of the combined value N, and a secure UKey stores the hash value N and the user password hash value K.
As shown in fig. 1 to fig. 3, the three-party authentication process includes the following detailed steps:
(1) and the safety UKey generates a random number a and sends K and a to the encryption solid-state disk.
(2) The encryption solid-state disk receives K and a and generates a random number b. And the XOR K and the PUF value P generate N, and the encrypted solid-state disk calculates N by using a hash algorithm to generate N. The encryption solid-state disk uses a symmetric cryptographic algorithm X, encrypts a by taking N as a key to generate A, and sends A and b to a secure UKey.
(3) The secure UKey receives A and decrypts A using the stored N as a key to generate a'. And (4) checking whether the decryption result is consistent with the a generated in the step (1), and if so, considering that the encrypted solid-state disk is credible by the security UKey. The security UKey uses N as a key, a cryptographic algorithm X encrypts B to generate B, and B and a threshold key component E2 are sent to an encrypted solid-state disk.
(4) And the user inputs the password K ', calculates the hash value K ' of the password K ', and checks whether the calculation result is consistent with the password hash value K stored in the safety UKey or not, and if so, the user identity is considered to be legal. K' is sent to the encrypted solid state disk.
(5) The encrypted solid state disk receives B and K'. XOR K 'and PUF value P to generate N', and calculating N 'by using hash algorithm to generate N' in the encrypted solid-state disk. The encrypted solid-state disk uses a symmetric cryptographic algorithm X to decrypt B by taking N 'as a secret key to generate B'. And (3) checking whether the decryption result is consistent with b generated in the step (2), and if so, considering the security UKey as credible by the encrypted solid-state disk.
(6) The encrypted solid-state disk synthesizes the self-stored threshold data key ciphertext component E1 and the received threshold data key ciphertext component E2 from the security UKey into a complete data key ciphertext E by using a threshold cryptographic algorithm. And the encrypted solid-state disk decrypts the data key ciphertext E by using the PUF value as a key by using a symmetric encryption algorithm Y to obtain a data key plaintext E. The authentication process ends.
Wherein the key management employs an encrypted solid-state disk PUF value P as a root key. And encrypting the data key E by using the PUF value P by using a symmetric encryption algorithm Y to generate a data key ciphertext E. And decomposing the data key ciphertext E by using a threshold cryptographic algorithm, storing a part of the threshold data key ciphertext E1 in an encrypted solid-state disk, and storing a part of the threshold data key ciphertext E2 in a safe UKey.
Wherein, the threshold cryptographic algorithm (t, n) has the total threshold key component number of n, and t is less than n. And when the threshold key component number is less than t, the complete data key ciphertext cannot be solved. The data key component number x < t stored in UKey, and the data key component number y < t, x + y > t stored in the encrypted solid-state disk. The complete data key ciphertext cannot be recovered by independently acquiring the secure UKey or encrypting the key component in the solid-state disk.
In the key management process, the PUF value of the encrypted solid-state disk is used as a root key for key management, the physical unclonable attribute of the PUF value is fully utilized, and the security of the root key is improved. Compared with the traditional key storage mode, any party who steals cannot acquire the complete data key ciphertext, and the safety of an encryption system is improved.
The invention has the beneficial effects that:
(1) in the authentication process, an encrypted solid-state disk PUF value is used as a credible core of security authentication, and a brand-new authentication handshake method is designed by combining a hash algorithm and a symmetric encryption algorithm. Compared with public and private key pair authentication, the method has the advantages of less resource consumption and higher computing speed. Compared with the existing symmetric algorithm authentication disk end, the authentication key does not need to be stored, the reliability of mutual authentication of the UKey and the encrypted solid-state disk after the binding is ensured by the physical unclonable characteristic of the PUF value, and the security and the reliability of the authentication process are integrally improved by the method.
(2) In the key management process, the PUF value of the encrypted solid-state disk is used as a root key for key management, the physical unclonable attribute of the PUF value is fully utilized, and the security of the root key is improved. Compared with the existing key storage mode, any party who steals cannot acquire the complete data key ciphertext, and the safety of an encryption system is improved.
The invention introduces the use of PUF in the hierarchical management of the key and the mutual authentication of the key. The key hierarchical management adopts a PUF value electrically generated by a built-in PUF module of an encryption solid-state disk main control chip as a root key to encrypt a data key. The PUF value can be unreadable and has the physical unclonable characteristic, and the security of the root key is guaranteed. A threshold encryption algorithm is introduced in the key management process, data key ciphertexts are respectively stored in a safe UKey and a solid-state disk after being decomposed, and a complete data key cannot be recovered when any party is stolen. Compared with the scheme of the existing public and private key pair authentication and symmetric encryption algorithm authentication, the key interaction authentication only needs to store the key in a UKey single way, and the authentication security and reliability are higher.
The above description is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, several modifications and variations can be made without departing from the technical principle of the present invention, and these modifications and variations should also be regarded as the protection scope of the present invention.

Claims (5)

1. A cryptographic solid state disk key management method based on PUF is characterized by comprising the following steps:
powering on the host computer, and performing bios self-checking;
the safety UKey verifies the identity of the encrypted solid-state disk and the verification password of the user, if the verification is passed, the password hash value and the threshold key component are sent to the encrypted solid-state disk, and the encrypted solid-state disk verifies the safety UKey identity, which comprises the following steps:
the safety UKey generates a random number a and sends hash values K and a to the encryption solid-state disk;
the encryption solid-state disk receives the hash values K and a and generates a random number b; the XOR K and the PUF value P generate N, the encryption solid-state disk calculates N by using a hash algorithm to generate N, the encryption solid-state disk encrypts a by using N as a key to generate A by using a symmetric cryptographic algorithm X, and A and b are sent to a secure Ukey;
the safety UKey receives A and decrypts A by using the stored N as a secret key to generate a'; checking whether the decryption result is consistent with the generated a, and if so, considering the encrypted solid-state disk to be credible by the safety UKey; b is generated by encrypting B by using N as a key and a symmetric cryptographic algorithm X, and B and a threshold key component E2 are sent to an encrypted solid-state disk;
the user inputs the password K ', calculates the hash value K ' of the password K ', checks whether the calculation result is consistent with the password hash value K stored in the safety UKey, and if so, the user identity is considered to be legal; sending K' to the encrypted solid-state disk;
the encrypted solid-state disk receives B and K ', XOR K ' and PUF value P to generate N ', the encrypted solid-state disk uses a hash algorithm to calculate N ' to generate N ', the encrypted solid-state disk uses a symmetric cryptographic algorithm X, and the N ' is used as a key to decrypt B to generate B ', whether a decryption result is in accordance with B is checked, and if the decryption result is in accordance with B, the encrypted solid-state disk considers that the UKey is safe and credible;
and the encrypted solid-state disk recovers the data key, decrypts the data in the disk and starts the system.
2. The method of encrypted solid-state disk key management of claim 1, further comprising: the method comprises the steps of binding a security Ukey and an encryption solid-state disk one by one in a security environment for the first time, setting a password K by a user, calculating a hash value K of the password K, calculating a combined value N of the password value K and an encryption solid-state disk PUF value P, calculating a hash value N of the combined value N by the encryption solid-state disk through a hash algorithm, and storing the hash value N and the user password hash value K by the security Ukey.
3. The method of claim 1, wherein the encrypted solid-state disk key management method uses an encrypted solid-state disk PUF value P as a root key, uses a symmetric encryption algorithm Y to encrypt a data key E with the PUF value P, generates a data key ciphertext E, decomposes the data key ciphertext E using a threshold algorithm, stores a portion of the threshold data key ciphertext E1 in the solid-state disk, and stores a portion of the threshold data key ciphertext E2 in the secure UKey.
4. The method for managing the key of the encrypted solid-state disk according to claim 1, wherein the total threshold number of key components is n, when the threshold number of key components is greater than or equal to a threshold t, the complete data key ciphertext can be solved, the number x < t of data key components stored in the secure UKey, the number y < t, x + y > t of data key components stored in the encrypted solid-state disk, and the secure UKey and the key components in the encrypted solid-state disk need to be obtained to recover the complete data key ciphertext.
5. The method for managing the encryption key of the solid-state disk according to claim 1, wherein after the identity of the security UKey is verified by the encryption solid-state disk, the encryption solid-state disk uses a threshold algorithm to synthesize the self-stored threshold data key ciphertext component E1 with the received threshold data key ciphertext component E2 from the security UKey into a complete data key ciphertext E, the encryption solid-state disk uses a symmetric encryption algorithm Y, and the data key ciphertext E is decrypted by using the PUF value as the key to obtain a data key plaintext E.
CN201910587599.6A 2019-07-02 2019-07-02 Encrypted solid-state disk key management method based on PUF Active CN110233729B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910587599.6A CN110233729B (en) 2019-07-02 2019-07-02 Encrypted solid-state disk key management method based on PUF

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910587599.6A CN110233729B (en) 2019-07-02 2019-07-02 Encrypted solid-state disk key management method based on PUF

Publications (2)

Publication Number Publication Date
CN110233729A CN110233729A (en) 2019-09-13
CN110233729B true CN110233729B (en) 2022-03-11

Family

ID=67857741

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910587599.6A Active CN110233729B (en) 2019-07-02 2019-07-02 Encrypted solid-state disk key management method based on PUF

Country Status (1)

Country Link
CN (1) CN110233729B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112069555B (en) * 2020-08-13 2022-03-18 中国电子科技集团公司第三十研究所 Safe computer architecture based on double-hard-disk cold switching operation
EP4352645A1 (en) 2021-06-07 2024-04-17 Telefonaktiebolaget LM Ericsson (publ) Storage device utilziing physically unclonable function (puf) based secret sharing scheme for data encryption/decryption
CN117501271A (en) 2021-06-07 2024-02-02 瑞典爱立信有限公司 Authenticating a storage device to a host by encrypting/decrypting data using a physical unclonable function PUF

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8667265B1 (en) * 2010-07-28 2014-03-04 Sandia Corporation Hardware device binding and mutual authentication
CN104836669A (en) * 2015-05-08 2015-08-12 东南大学 Security authentication method based on SRAM PUF (Static Random Access Memory Physical Uncloable Function), terminal and authentication system
CN108199845A (en) * 2017-12-08 2018-06-22 中国电子科技集团公司第三十研究所 A kind of light-weight authentication equipment and authentication method based on PUF
CN108737076A (en) * 2017-04-13 2018-11-02 山东量子科学技术研究院有限公司 A kind of identity authorization system and identity identifying method
CN108920984A (en) * 2018-07-06 2018-11-30 北京计算机技术及应用研究所 The anti-clone of one kind distorts safe SSD main control chip framework
CN109040067A (en) * 2018-08-02 2018-12-18 广东工业大学 A kind of user authentication device and authentication method based on the unclonable technology PUF of physics

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9367701B2 (en) * 2013-03-08 2016-06-14 Robert Bosch Gmbh Systems and methods for maintaining integrity and secrecy in untrusted computing platforms

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8667265B1 (en) * 2010-07-28 2014-03-04 Sandia Corporation Hardware device binding and mutual authentication
CN104836669A (en) * 2015-05-08 2015-08-12 东南大学 Security authentication method based on SRAM PUF (Static Random Access Memory Physical Uncloable Function), terminal and authentication system
CN108737076A (en) * 2017-04-13 2018-11-02 山东量子科学技术研究院有限公司 A kind of identity authorization system and identity identifying method
CN108199845A (en) * 2017-12-08 2018-06-22 中国电子科技集团公司第三十研究所 A kind of light-weight authentication equipment and authentication method based on PUF
CN108920984A (en) * 2018-07-06 2018-11-30 北京计算机技术及应用研究所 The anti-clone of one kind distorts safe SSD main control chip framework
CN109040067A (en) * 2018-08-02 2018-12-18 广东工业大学 A kind of user authentication device and authentication method based on the unclonable technology PUF of physics

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"A PUF-based hardware mutual authentication protocol";Mario Barbareschi;《ournal of Parallel and Distributed Computing》;20180418;全文 *
"一种基于SRAM PUF的安全双向认证协议";刘丹;《密码学报》;20170815;全文 *

Also Published As

Publication number Publication date
CN110233729A (en) 2019-09-13

Similar Documents

Publication Publication Date Title
KR101999188B1 (en) Secure personal devices using elliptic curve cryptography for secret sharing
KR101010040B1 (en) File encryption/decryption method, device, program, and computer-readable recording medium containing the program
CN103179086B (en) Remote storage processing method and the system of data
US9043610B2 (en) Systems and methods for data security
US20160323105A1 (en) Device, server and method for providing secret key encryption and restoration
US20100005318A1 (en) Process for securing data in a storage unit
CN110958219B (en) SM2 proxy re-encryption method and device for medical cloud shared data
US11874935B2 (en) Protecting data from brute force attack
US8806206B2 (en) Cooperation method and system of hardware secure units, and application device
CN107908574B (en) Safety protection method for solid-state disk data storage
CN110233729B (en) Encrypted solid-state disk key management method based on PUF
CN110868291B (en) Data encryption transmission method, device, system and storage medium
CN107920052B (en) Encryption method and intelligent device
CN113472793A (en) Personal data protection system based on hardware password equipment
EP4300338A1 (en) Computer file security encryption method, computer file security decryption method, and readable storage medium
CN112383391A (en) Data security protection method based on data attribute authorization, storage medium and terminal
TWI476629B (en) Data security and security systems and methods
CN107911221B (en) Key management method for secure storage of solid-state disk data
JP2022542095A (en) Hardened secure encryption and decryption system
CN110837634B (en) Electronic signature method based on hardware encryption machine
CN112685786A (en) Financial data encryption and decryption method, system, equipment and storage medium
CN109412795A (en) A kind of Virtual Intelligent cipher key
CN110365472B (en) Quantum communication service station digital signature method and system based on asymmetric key pool pair
CN109299618B (en) Quantum-resistant computing cloud storage method and system based on quantum key card
CN112787996B (en) Password equipment management method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant