CN115208587B - System and method for realizing cryptographic algorithm based on cryptographic module - Google Patents

System and method for realizing cryptographic algorithm based on cryptographic module Download PDF

Info

Publication number
CN115208587B
CN115208587B CN202211120108.5A CN202211120108A CN115208587B CN 115208587 B CN115208587 B CN 115208587B CN 202211120108 A CN202211120108 A CN 202211120108A CN 115208587 B CN115208587 B CN 115208587B
Authority
CN
China
Prior art keywords
module
cryptographic algorithm
cryptographic
verification
algorithm module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211120108.5A
Other languages
Chinese (zh)
Other versions
CN115208587A (en
Inventor
桑洪波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sanwei Xin'an Technology Co ltd
Original Assignee
Sanwei Xin'an Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sanwei Xin'an Technology Co ltd filed Critical Sanwei Xin'an Technology Co ltd
Priority to CN202211120108.5A priority Critical patent/CN115208587B/en
Publication of CN115208587A publication Critical patent/CN115208587A/en
Application granted granted Critical
Publication of CN115208587B publication Critical patent/CN115208587B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Abstract

The invention discloses a system and a method for realizing a cryptographic algorithm based on a cryptographic module, wherein the system comprises: the starting signal module sends a starting signal by the cryptographic module and controls the first and second cryptographic algorithm modules to start at the same time, so that the two cryptographic algorithm modules perform parallel operation; the first and second cryptographic algorithm modules are internally provided with the same cryptographic algorithm and execute the operation operations of signature, verification, encryption and/or decryption on data; the verification output module is used for verifying the operation results of the first and second cryptographic algorithm modules; and when the verification fails, sending a restart signal, and simultaneously controlling the first and second cryptographic algorithm modules to execute the operation in parallel. The cryptographic algorithm implementation system does not influence the cryptographic operation performance, can ensure the correctness of cryptographic algorithm operation data, and can verify error operation in real time; when the verification fails for multiple times, the alarm can be realized; the method avoids the occurrence of the conditions that the operation of the cryptographic algorithm is wrong due to factors such as interference or instability, the cryptographic algorithm is not found in time after errors occur, and the like.

Description

System and method for realizing cryptographic algorithm based on cryptographic module
Technical Field
The invention relates to the technical field of information security, in particular to a system and a method for realizing a cryptographic algorithm based on a cryptographic module.
Background
In order to ensure the security of the commercial cipher, the national commercial cipher administration sets a series of cipher standards including SM1, SM2, SM3, SM4, SM7, SM9, zucc cipher algorithm (ZUC), and so on.
At present, national cryptographic algorithms such as SM1, SM2, SM3, SM4, SM7, SM9, ZUC (ZUC) and the like can meet the requirements of signature/verification, encryption/decryption of application system data, ensure the confidentiality, integrity and validity of transmitted information, are applied to e-government affairs, e-commerce and enterprise informatization systems such as online examination and approval, online office, online banking, online securities, online payment and the like, and provide safety guarantee for social informatization development. At present, various cryptographic manufacturers in China realize various cryptographic algorithms by adopting AISC (automatic identification system) chips or FPGA (field programmable gate array) chips and other hardware, and the cryptographic algorithms are integrated in cryptographic equipment such as a cryptographic card and a cryptographic server as cryptographic modules.
The cryptographic algorithm is the root of data security and is not susceptible to half-divide errors. The cryptographic algorithm realized by hardware such as an AISC chip or an FPGA chip is generally integrated in a hardware board card, the correctness of the cryptographic algorithm depends on the stability of the hardware board card, and the cryptographic algorithm realized by software depends on the stability of a CPU and an internal memory. The data calculated after the cipher algorithm is corrupted is random and unpredictable, and if errors occur during the operation of the cipher algorithm, the loss to the client will be catastrophic. For example, in the encryption storage device, the algorithm is wrong in the encryption process of the SM4 cryptographic algorithm, the data falling into the disk forms an error ciphertext which is not found in time, and once the device is shut down or restarted, the error ciphertext may not be decrypted.
And various cryptographic operations such as symmetric algorithms of SM1, SM4, SM7 and the like are used for encryption and decryption, and signature verification of SM2, SM9 and the like are used. After the symmetric algorithm performs encryption operation, decryption needs to be performed again and the result needs to be compared to determine whether the encrypted data is correct, and signature verification functions of SM2, SM9 and the like can determine whether the signature data is correct by performing verification again after the signature is completed. Such an operation is not easy to implement in applications, such as an SM2 public cryptographic algorithm, in which one party possesses a public key and the other party possesses a private key, and after data is encrypted by using the public key, the party possessing the public key does not have the private key to decrypt. In addition, even if the public key and the private key are possessed simultaneously, the method is not adopted in consideration of algorithm performance factors, and the performance gap between public key operation and private key operation is large.
Disclosure of Invention
The invention provides a system and a method for realizing a cryptographic algorithm based on a cryptographic module, aiming at the problems, the system for realizing the cryptographic algorithm can ensure the correctness of the operation data of the cryptographic algorithm, and avoid the occurrence of the conditions that the operation of the cryptographic algorithm is wrong due to factors such as interference or instability, the operation is not found in time after the operation is wrong, and the like.
In order to achieve the purpose, the invention adopts the technical scheme that:
in a first aspect, the present invention provides a cryptographic module-based implementation system for a cryptographic algorithm, including:
the system comprises a starting signal module, a first cryptographic algorithm module, a second cryptographic algorithm module and a verification output module;
the starting signal module sends a starting signal by the cryptographic module, and is used for simultaneously controlling the first cryptographic algorithm module and the second cryptographic algorithm module to start so as to realize the parallel operation of the two cryptographic algorithm modules;
the first cryptographic algorithm module and the second cryptographic algorithm module are both internally provided with the same cryptographic algorithm and used for executing the operation operations of signature, verification, encryption and/or decryption on data;
the verification output module is used for verifying the operation results of the first cryptographic algorithm module and the second cryptographic algorithm module; and sending a restart signal after the verification fails, and simultaneously controlling the first cryptographic algorithm module and the second cryptographic algorithm module to execute operation in parallel.
Furthermore, in the verification output module, after restarting signals of preset times are continuously sent out, if the verification fails, the operation of the cipher algorithm is alarmed to be wrong; and returning the password operation data when the verification is successful.
Further, when the first cryptographic algorithm module and the second cryptographic algorithm module are both internally provided with an SM2 algorithm and are used for executing an SM2 signature and/or an SM2 encryption operation, the system further includes: a random number module;
the random digital-analog module is connected with the first cryptographic algorithm module and the second cryptographic algorithm module in an embedded mode; the random number module is used for generating random numbers and simultaneously providing the random numbers to the first cryptographic algorithm module and the second cryptographic algorithm module.
In a second aspect, an embodiment of the present invention further provides a method for implementing a cryptographic algorithm based on a cryptographic module, where the method applies the system for implementing a cryptographic algorithm based on a cryptographic module according to the above embodiment, and the method includes the following steps:
s1, after data to be operated are input into a data input interface, a starting signal module sends out parallel operation for simultaneously starting a first cryptographic algorithm module and a second cryptographic algorithm module;
s2, the first cryptographic algorithm module and the second cryptographic algorithm module simultaneously read the data to be operated, and start corresponding cryptographic operation according to an operation instruction;
s3, the verification output module verifies the operation results of the first password algorithm module and the second password algorithm module;
and S4, when the verification fails, the verification output module sends a restart signal and controls the first password algorithm module and the second password algorithm module to execute operation in parallel.
Further, still include:
s5, after the verification output module continuously sends restart signals for preset times, if verification fails, a password algorithm operation error is warned; and returning the password operation data when the verification is successful.
Further, the step S2 further includes:
when the cryptographic operation is used to perform an SM2 signature and/or SM2 encryption operation, the random number module generates a random number and provides the random number to both the first cryptographic algorithm module and the second cryptographic algorithm module.
Compared with the prior art, the invention has the following beneficial effects:
the implementation system of the cryptographic algorithm based on the cryptographic module provided by the embodiment of the invention comprises: the starting signal module sends a starting signal by the cryptographic module and is used for simultaneously controlling the first cryptographic algorithm module and the second cryptographic algorithm module to start so as to realize the parallel operation of the two cryptographic algorithm modules; the first cryptographic algorithm module and the second cryptographic algorithm module are both internally provided with the same cryptographic algorithm and used for executing the operation operations of signature, verification, encryption and/or decryption on data; the verification output module is used for verifying the operation results of the first cryptographic algorithm module and the second cryptographic algorithm module; and sending a restart signal after the verification fails, and simultaneously controlling the first cryptographic algorithm module and the second cryptographic algorithm module to execute operation in parallel. The cryptographic algorithm implementation system does not influence the cryptographic operation performance, can ensure the correctness of cryptographic algorithm operation data, and can verify error operation in real time; furthermore, when the verification fails for many times, the alarm can be realized; the method avoids the occurrence of the conditions that the operation of the cryptographic algorithm is wrong and the cryptographic algorithm is not found in time after the operation is made mistakes due to factors such as interference or instability and the like.
Drawings
Fig. 1 is a block diagram of a system for implementing a cryptographic algorithm based on a cryptographic module according to an embodiment of the present invention;
fig. 2 is a flowchart of a method for implementing a cryptographic algorithm based on a cryptographic module according to an embodiment of the present invention.
Detailed Description
In order to make the technical means, the creation characteristics, the achievement purposes and the effects of the invention easy to understand, the invention is further described with the specific embodiments.
In the description of the present invention, it should be noted that the terms "upper", "lower", "inner", "outer", "front", "rear", "both ends", "one end", "the other end", and the like indicate orientations or positional relationships based on orientations or positional relationships shown in the drawings, and are only for convenience of description and simplification of description, but do not indicate or imply that the device or element referred to must have a specific orientation, be configured in a specific orientation, and operate, and thus, should not be construed as limiting the present invention. Furthermore, the terms "first," "second," and the like are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In the description of the present invention, it is to be noted that, unless otherwise explicitly specified or limited, the terms "mounted," "disposed," "connected," and the like are to be construed broadly, such as "connected," which may be fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
Example 1:
referring to fig. 1, the system for implementing a cryptographic algorithm based on a cryptographic module according to the present invention includes: the system comprises a starting signal module, a first cryptographic algorithm module, a second cryptographic algorithm module and a verification output module;
the starting signal module sends a starting signal by the cryptographic module and is used for simultaneously controlling the starting of the first cryptographic algorithm module and the second cryptographic algorithm module so as to realize the parallel operation of the two cryptographic algorithm modules; for example, if a PCI crypto card is used, if the FPGA is used to implement the cryptographic algorithm, the FPGA sends out the start signal.
The first cryptographic algorithm module and the second cryptographic algorithm module are both internally provided with the same cryptographic algorithm and used for executing the operation operations of signature, verification, encryption and/or decryption on data; the two algorithm modules are connected with the same input and the same starting signal. The two cryptographic algorithm modules are adopted to do the same work, so that the accuracy of the operation can be ensured. When only one algorithm module is used, if the algorithm module is accidentally failed, the error is made and the data is encrypted and stored in the database, and the error cannot be corrected immediately by only one module.
The verification output module is used for verifying the operation results of the first password algorithm module and the second password algorithm module; and when the verification fails, sending a restart signal, and simultaneously controlling the first cryptographic algorithm module and the second cryptographic algorithm module to execute operation in parallel. The verification output module can quickly verify the operation results of the first password algorithm module and the second password algorithm module, and all data can be output only after being verified. If the verification fails, a restart signal is started, the restart signal is sent at most twice, for example, if the verification fails after two times, the operation error of the cipher algorithm is alarmed, and if the verification succeeds, the cipher operation data is returned.
As shown in fig. 1, further, the system further includes a random number module:
the random number module generates random numbers and can provide the generated random numbers to the first cryptographic algorithm module and the second cryptographic algorithm module at the same time. By analyzing the algorithm characteristics of SM2 encryption and SM2 signature, the same plaintext and the same secret key have different operation results each time, so that the random number module is connected with the first cryptographic algorithm module and the second cryptographic algorithm module in an embedded connection mode, and the random number is prevented from being illegally acquired, and the safety of the algorithm is ensured.
The cryptographic algorithm implementation system does not influence the cryptographic operation performance, can ensure the correctness of cryptographic algorithm operation data, and can verify error operation in real time; furthermore, when the verification fails for many times, the alarm can be realized; the method avoids the occurrence of the conditions that the operation of the cryptographic algorithm is wrong and the cryptographic algorithm is not found in time after the operation is made mistakes due to factors such as interference or instability and the like.
The cryptographic module in the embodiment of the invention takes a PCI cryptographic card as an example for detailed description, and the PCI cryptographic card integrates a cryptographic algorithm:
the specific embodiment is as follows:
two chips supporting SM2, SM3 and SM4 cryptographic algorithms and a random number chip are integrated in the PCI cryptographic card, and the data input and output and the starting signal are controlled through FPGA logic control, and a verification output module is realized; the upper layer business calls a password card through a password card interface, and different instructions are set for each password algorithm in the password card interface;
1) The FPGA logic receives a password operation request and data to be operated, and simultaneously starts two SM2, SM3 and SM4 password algorithm chips;
2) The two SM2, SM3 and SM4 cryptographic algorithm chips simultaneously read data to be operated and execute corresponding cryptographic algorithms according to operation instructions; if the operation is SM2 signature and SM2 encryption operation, a common random number chip is accessed to obtain the same random number, and then the follow-up operation of SM2 signature and SM2 encryption is executed. If the encryption operations are SM2 decryption, SM2 verification, SM2 negotiation, SM3, SM4 and the like, the random number chip does not need to be accessed.
3) The FPGA controls the operation result data to enter a verification output module, the verification output module carries out XOR operation on the two operation results, if the return value is 0, the verification is passed, and the verification output module outputs the operation result. If the return value is not 0, the verification is failed, and the verification output module sends out a restart signal.
4) And after receiving the restart signal, the two SM2, SM3 and SM4 cryptographic algorithm chips read the data to be operated again and execute the corresponding cryptographic algorithm according to the operation instruction. The starting signal is started twice at most, and if the return value of the verification output module is still not 0, the operation of the alarm password algorithm fails.
Through the implementation process, the cryptographic operation performance of each item of the PCI cryptographic card basically accords with the performances of SM2, SM3 and SM4 cryptographic algorithm chips, and the correctness of cryptographic operation data can be guaranteed. Simulating a scene that one data line of one SM2, SM3 and SM4 cryptographic algorithm chip is disconnected, and finding that bit data corresponding to the data line in all data is 0 through testing. The PCI password card can immediately acquire the alarm of the password operation data error by adopting the implementation process.
Example 2:
as shown in fig. 2, an embodiment of the present invention further provides a method for implementing a cryptographic algorithm based on a cryptographic module, where an implementation system of the cryptographic algorithm based on the cryptographic module in embodiment 1 is applied, and the method includes the following steps:
s1, after data to be operated are input into a data input interface, a signal starting module is started to send out and simultaneously start a first password algorithm module and a second password algorithm module to operate in parallel;
s2, the first cryptographic algorithm module and the second cryptographic algorithm module simultaneously read the data to be operated, and start corresponding cryptographic operation according to an operation instruction;
s3, the verification output module verifies the operation results of the first cryptographic algorithm module and the second cryptographic algorithm module;
and S4, when the verification fails, the verification output module sends a restart signal and controls the first cryptographic algorithm module and the second cryptographic algorithm module to execute operation in parallel.
Further, still include:
s5, after the verification output module continuously sends restart signals for preset times, if verification fails, a password algorithm operation error is warned; and returning the password operation data when the verification is successful.
Further, the step S2 further includes:
when the cryptographic operation is used to perform an SM2 signature and/or SM2 encryption operation, the random number module generates a random number and provides the random number to both the first cryptographic algorithm module and the second cryptographic algorithm module.
In particular implementation, referring to fig. 1 and 2, the method comprises the steps of:
1) After the data to be operated is input through the data input interface, the first password algorithm module and the second password algorithm module are started at the same time.
2) The first cryptographic algorithm module and the second cryptographic algorithm module simultaneously read the data to be operated, and start corresponding cryptographic operation according to the operation instruction. If the signature is SM2 signature and the SM2 encryption operation is performed, the random numbers generated by the random number module are read at the same time, and the random numbers obtained by the first cryptographic algorithm module and the second cryptographic algorithm module are the same.
3) And the operation results of the first cryptographic algorithm module and the second cryptographic algorithm module are output to the verification output module.
4) And the verification output module starts a verification function, and if the verification result is not 0, a restart signal is initiated to the first cryptographic algorithm module and the second cryptographic algorithm module. And if the check result is 0, outputting the operation data.
5) And after the first cryptographic algorithm module and the second cryptographic algorithm module are restarted, the execution is automatically carried out again at 2) - > 3) - > 4). The restarting signal is sent at most twice, and if the three verification results in 4) are all non-0, an error alarm is carried out.
The implementation method of the cryptographic algorithm does not influence the cryptographic operation performance, can ensure the correctness of the cryptographic algorithm operation data, and can verify the error operation in real time; furthermore, when the verification fails for many times, the alarm can be realized; the method avoids the occurrence of the conditions that the operation of the cryptographic algorithm is wrong due to factors such as interference or instability, the cryptographic algorithm is not found in time after errors occur, and the like.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (6)

1. A cryptographic module-based implementation system of a cryptographic algorithm is characterized by comprising:
the system comprises a starting signal module, a first cryptographic algorithm module, a second cryptographic algorithm module and a verification output module; the first cryptographic algorithm module and the second cryptographic algorithm module are integrated in the same cryptographic module; the first password algorithm module and the second password algorithm module are connected with the same input;
the starting signal module is used for sending a starting signal by the password module and simultaneously controlling the first password algorithm module and the second password algorithm module to start so as to realize the parallel operation of the two password algorithm modules;
the first cryptographic algorithm module and the second cryptographic algorithm module are both internally provided with the same cryptographic algorithm and used for executing the operation operations of signature, verification, encryption and/or decryption on data;
the verification output module is used for verifying the operation results of the first cryptographic algorithm module and the second cryptographic algorithm module; performing exclusive-or operation on the two operation results, if the return value is 0, indicating that the verification is passed, and outputting the operation result by a verification output module; if the return value is not 0, the verification is failed, and the verification output module sends a restart signal; and sending a restart signal after the verification fails, and simultaneously controlling the first cryptographic algorithm module and the second cryptographic algorithm module to execute operation in parallel.
2. The system of claim 1, wherein the verification output module is configured to, after a predetermined number of restart signals are continuously sent, alarm that the cryptographic algorithm is operated incorrectly if the verification fails; and returning the password operation data when the verification is successful.
3. The system for implementing cryptographic module-based cryptographic algorithm according to claim 2, wherein when the first cryptographic algorithm module and the second cryptographic algorithm module each have an SM2 algorithm built therein and are configured to perform SM2 signature and/or SM2 encryption operation, the system further comprises: a random number module;
the random digital-analog module is connected with the first cryptographic algorithm module and the second cryptographic algorithm module in an embedded mode; the random number module is used for generating random numbers and simultaneously providing the random numbers to the first cryptographic algorithm module and the second cryptographic algorithm module.
4. A method for implementing cryptographic module-based cryptographic algorithm, characterized in that the implementation system of cryptographic module-based cryptographic algorithm according to any one of claims 1-3 is applied, the method comprising the following steps:
s1, after data to be operated are input into a data input interface, a signal starting module sends a signal for simultaneously starting a first cryptographic algorithm module and a second cryptographic algorithm module to operate in parallel;
s2, the first cryptographic algorithm module and the second cryptographic algorithm module simultaneously read the data to be operated, and start corresponding cryptographic operation according to an operation instruction;
s3, the verification output module verifies the operation results of the first password algorithm module and the second password algorithm module; performing exclusive-or operation on the two operation results, if the return value is 0, indicating that the verification is passed, and outputting the operation result by a verification output module; if the return value is not 0, the verification is failed;
and S4, when the verification fails, the verification output module sends a restart signal and controls the first password algorithm module and the second password algorithm module to execute operation in parallel.
5. The method of claim 4, further comprising:
s5, after the verification output module continuously sends restart signals for preset times, if the verification fails, the operation of the cipher algorithm is alarmed to be wrong; and returning the password operation data when the verification is successful.
6. The method according to claim 5, wherein the step S2 further comprises:
when the cryptographic operation is used to perform an SM2 signature and/or SM2 encryption operation, the random number module generates a random number and provides the random number to both the first cryptographic algorithm module and the second cryptographic algorithm module.
CN202211120108.5A 2022-09-15 2022-09-15 System and method for realizing cryptographic algorithm based on cryptographic module Active CN115208587B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211120108.5A CN115208587B (en) 2022-09-15 2022-09-15 System and method for realizing cryptographic algorithm based on cryptographic module

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211120108.5A CN115208587B (en) 2022-09-15 2022-09-15 System and method for realizing cryptographic algorithm based on cryptographic module

Publications (2)

Publication Number Publication Date
CN115208587A CN115208587A (en) 2022-10-18
CN115208587B true CN115208587B (en) 2022-12-09

Family

ID=83571767

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211120108.5A Active CN115208587B (en) 2022-09-15 2022-09-15 System and method for realizing cryptographic algorithm based on cryptographic module

Country Status (1)

Country Link
CN (1) CN115208587B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2011223495A (en) * 2010-04-14 2011-11-04 Sony Corp Information processor and method, and program
CN109981671A (en) * 2019-04-03 2019-07-05 北京深思数盾科技股份有限公司 Data processing method and encryption equipment based on encryption equipment
WO2022008587A1 (en) * 2020-07-08 2022-01-13 Bundesdruckerei Gmbh Provider and receiver cryptosystems comprising combined algorithms

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI234706B (en) * 2002-07-26 2005-06-21 Hon Hai Prec Ind Co Ltd System and method for firmware authentication

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2011223495A (en) * 2010-04-14 2011-11-04 Sony Corp Information processor and method, and program
CN109981671A (en) * 2019-04-03 2019-07-05 北京深思数盾科技股份有限公司 Data processing method and encryption equipment based on encryption equipment
WO2022008587A1 (en) * 2020-07-08 2022-01-13 Bundesdruckerei Gmbh Provider and receiver cryptosystems comprising combined algorithms

Also Published As

Publication number Publication date
CN115208587A (en) 2022-10-18

Similar Documents

Publication Publication Date Title
CN110519260B (en) Information processing method and information processing device
US9729322B2 (en) Method and system for smart card chip personalization
US8504838B2 (en) Integrity protected smart card transaction
EP2999156A1 (en) Device authenticity determination system and device authenticity determination method
US9185111B2 (en) Cryptographic authentication techniques for mobile devices
US20130129087A1 (en) Secure Key Generation
US11374767B2 (en) Key-based authentication for backup service
CN110990827A (en) Identity information verification method, server and storage medium
CN112425114A (en) Password manager protected by public-private key pair
US20230412399A1 (en) Database Multi-Authentication Method and System, Terminal, and Storage Medium
CN111327629B (en) Identity verification method, client and server
KR20180031584A (en) Memory system and binding method between the same and host
CN107944234A (en) A kind of brush machine control method of Android device
WO2021137684A1 (en) System and method for integrating digital identity verification to authentication platform
CN114513310A (en) Authentication method and device for vehicle diagnosis equipment, electronic equipment and medium
CN109981671B (en) Data processing method based on encryption machine and encryption machine
CN112966254B (en) Secure communication method and system for host and trusted cryptographic module
CN115208587B (en) System and method for realizing cryptographic algorithm based on cryptographic module
CN116821918A (en) Online upgrading method, chip device, computer terminal and storage medium
CN115987655A (en) Remote access method, system and equipment based on user identity deep recognition
US11574079B2 (en) Multi-stage provisioning of secret data
CN110659522B (en) Storage medium security authentication method and device, computer equipment and storage medium
CN111988146B (en) Identity verification method, device, equipment and machine readable storage medium
CN114553566A (en) Data encryption method, device, equipment and storage medium
CN109951319B (en) Method for backing up lock of manager of encryption equipment and encryption equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant