CN114731271A - 信息处理方法、装置、电子设备和存储介质 - Google Patents
信息处理方法、装置、电子设备和存储介质 Download PDFInfo
- Publication number
- CN114731271A CN114731271A CN202080002515.9A CN202080002515A CN114731271A CN 114731271 A CN114731271 A CN 114731271A CN 202080002515 A CN202080002515 A CN 202080002515A CN 114731271 A CN114731271 A CN 114731271A
- Authority
- CN
- China
- Prior art keywords
- index parameter
- bit information
- sequence
- challenge
- characteristic bit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000003860 storage Methods 0.000 title claims abstract description 16
- 230000010365 information processing Effects 0.000 title claims description 45
- 238000003672 processing method Methods 0.000 title claims description 24
- 230000004044 response Effects 0.000 claims abstract description 115
- 238000012545 processing Methods 0.000 claims abstract description 38
- 238000000034 method Methods 0.000 claims abstract description 19
- 230000006870 function Effects 0.000 claims description 60
- 238000012805 post-processing Methods 0.000 claims description 11
- 238000004590 computer program Methods 0.000 claims description 6
- 238000004904 shortening Methods 0.000 claims description 6
- 238000006243 chemical reaction Methods 0.000 claims 1
- 230000008569 process Effects 0.000 description 12
- 238000010586 diagram Methods 0.000 description 8
- 238000004891 communication Methods 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 6
- 238000005336 cracking Methods 0.000 description 4
- 230000009466 transformation Effects 0.000 description 4
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000001514 detection method Methods 0.000 description 3
- 238000004519 manufacturing process Methods 0.000 description 3
- 238000004088 simulation Methods 0.000 description 3
- 238000013475 authorization Methods 0.000 description 2
- 238000004422 calculation algorithm Methods 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 238000013507 mapping Methods 0.000 description 2
- 230000001740 anti-invasion Effects 0.000 description 1
- 238000013473 artificial intelligence Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000002035 prolonged effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000001131 transforming effect Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3278—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
一种数据处理方法,包括:(S11):获取挑战响应对的挑战序列,通过物理不可克隆函数生成对应于挑战响应对的原始响应序列;(S12):根据挑战序列生成第一索引参数,并根据第一索引参数在原始响应序列中获取特征比特信息;(S13):根转换挑战序列以生成第二索引参数,并根据第二索引参数和特征比特信息更新第一索引参数;(S14):根据更新的第一索引参数在原始响应序列中获取新的特征比特信息;(S15):重复生成第二索引参数以及根据第二索引参数和最新获取的特征比特信息更新第一索引参数并获取多个特征比特信息,以根据多个特征比特信息生成目标响应序列。本申请还公开了一种数据处理装置(10)、电子设备(100)和计算机存储介质(40)。
Description
PCT国内申请,说明书已公开。
Claims (11)
- PCT国内申请,权利要求书已公开。
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2020/124372 WO2022087888A1 (zh) | 2020-10-28 | 2020-10-28 | 信息处理方法、装置、电子设备和存储介质 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114731271A true CN114731271A (zh) | 2022-07-08 |
CN114731271B CN114731271B (zh) | 2023-06-13 |
Family
ID=81381663
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202080002515.9A Active CN114731271B (zh) | 2020-10-28 | 2020-10-28 | 信息处理方法、装置、电子设备和存储介质 |
Country Status (3)
Country | Link |
---|---|
US (1) | US20230403166A1 (zh) |
CN (1) | CN114731271B (zh) |
WO (1) | WO2022087888A1 (zh) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100127822A1 (en) * | 2008-11-21 | 2010-05-27 | Verayo, Inc. | Non-networked rfid-puf authentication |
CN105337725A (zh) * | 2014-08-08 | 2016-02-17 | 中国科学院数据与通信保护研究教育中心 | 一种密钥管理装置及方法 |
CN105354604A (zh) * | 2015-10-30 | 2016-02-24 | 中山大学 | 一种有效的基于物理不可克隆函数的防伪新方法 |
US20190354672A1 (en) * | 2018-05-17 | 2019-11-21 | Arizona Board Of Regents On Behalf Of Northern Arizona University | Password management with addressable physical unclonable function generators |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP6831293B2 (ja) * | 2016-05-26 | 2021-02-17 | ヌヴォトンテクノロジージャパン株式会社 | 画像偽造防止装置 |
US10892903B2 (en) * | 2018-05-29 | 2021-01-12 | Ememory Technology Inc. | Communication system capable of preserving a chip-to-chip integrity |
CN109190358B (zh) * | 2018-09-18 | 2020-10-27 | 中国科学院计算技术研究所 | 站点密码生成方法、系统及密码管理器 |
CN110049002B (zh) * | 2019-03-01 | 2021-07-27 | 中国电子科技集团公司第三十研究所 | 一种基于PUF的IPSec认证方法 |
CN111581675A (zh) * | 2020-04-10 | 2020-08-25 | 安徽大学 | 一种基于阻变存储器的物理不可克隆函数电路结构 |
-
2020
- 2020-10-28 WO PCT/CN2020/124372 patent/WO2022087888A1/zh active Application Filing
- 2020-10-28 CN CN202080002515.9A patent/CN114731271B/zh active Active
- 2020-10-28 US US18/033,807 patent/US20230403166A1/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100127822A1 (en) * | 2008-11-21 | 2010-05-27 | Verayo, Inc. | Non-networked rfid-puf authentication |
CN105337725A (zh) * | 2014-08-08 | 2016-02-17 | 中国科学院数据与通信保护研究教育中心 | 一种密钥管理装置及方法 |
CN105354604A (zh) * | 2015-10-30 | 2016-02-24 | 中山大学 | 一种有效的基于物理不可克隆函数的防伪新方法 |
US20190354672A1 (en) * | 2018-05-17 | 2019-11-21 | Arizona Board Of Regents On Behalf Of Northern Arizona University | Password management with addressable physical unclonable function generators |
Non-Patent Citations (1)
Title |
---|
魏祥野等: "物联网硬件安全研究", 《微纳电子与智能制造》 * |
Also Published As
Publication number | Publication date |
---|---|
US20230403166A1 (en) | 2023-12-14 |
CN114731271B (zh) | 2023-06-13 |
WO2022087888A1 (zh) | 2022-05-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Delvaux | Machine-learning attacks on polypufs, ob-pufs, rpufs, lhs-pufs, and puf–fsms | |
Souyah et al. | An image encryption scheme combining chaos-memory cellular automata and weighted histogram | |
Zhang et al. | Chaos-based image encryption with total shuffling and bidirectional diffusion | |
CN105471575B (zh) | 一种信息加密、解密方法及装置 | |
Hsiao et al. | Fingerprint image cryptography based on multiple chaotic systems | |
KR101393806B1 (ko) | 다단계 물리적 복제 불가 함수 시스템 | |
Zhang et al. | An Image Encryption Algorithm Based on Hyperchaotic System and Variable‐Step Josephus Problem | |
JP2016517243A (ja) | データを暗号化するシステムおよび方法 | |
CN110489466B (zh) | 邀请码的生成方法、装置、终端设备及存储介质 | |
Zhang et al. | Fast correlation attacks on Grain-like small state stream ciphers | |
CN110663216A (zh) | 密码设备和方法 | |
CN110717151A (zh) | 一种数字指纹处理及签名处理方法 | |
CN107665314B (zh) | 在电子文档上签名的可信处理方法及装置 | |
US7809130B1 (en) | Password recovery system and method | |
US20220029836A1 (en) | Puf-ipa: a puf-based identity preserving lightweight authentication protocol using binary string shuffling | |
US20240178999A1 (en) | Method for data encryption, terminal device and non-transitory computer-readable storage medium | |
CN110515591B (zh) | 基于区块链的随机数生成方法及装置 | |
CN114731271B (zh) | 信息处理方法、装置、电子设备和存储介质 | |
CN110784313A (zh) | 一种密钥的保护方法、设备以及存储介质 | |
Sakallı et al. | On the construction of 20× 20 and 24× 24 binary matrices with good implementation properties for lightweight block ciphers and hash functions | |
US11789897B2 (en) | Data processing circuit, data processing method, and electronic device | |
Alarcon-Aquino et al. | Biometric Cryptosystem based on Keystroke Dynamics and K-medoids | |
Xing et al. | Chaotic-map image encryption scheme based on AES key producing schedule | |
Varghese et al. | 3-Level Password Authentication System | |
KR102236242B1 (ko) | 퍼지 추출기를 이용한 공개값 생성 방법 및 그 공개값과 2차 입력값을 입력받아 비밀키를 생성하는 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |