CN115811397B - High-safety server cipher machine - Google Patents

High-safety server cipher machine Download PDF

Info

Publication number
CN115811397B
CN115811397B CN202211455571.5A CN202211455571A CN115811397B CN 115811397 B CN115811397 B CN 115811397B CN 202211455571 A CN202211455571 A CN 202211455571A CN 115811397 B CN115811397 B CN 115811397B
Authority
CN
China
Prior art keywords
task
random number
characterization
data
data set
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211455571.5A
Other languages
Chinese (zh)
Other versions
CN115811397A (en
Inventor
张敏
胡洪金
崔焕�
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Shenzhou Anfu Technology Co ltd
Original Assignee
Beijing Shenzhou Anfu Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Shenzhou Anfu Technology Co ltd filed Critical Beijing Shenzhou Anfu Technology Co ltd
Priority to CN202211455571.5A priority Critical patent/CN115811397B/en
Publication of CN115811397A publication Critical patent/CN115811397A/en
Application granted granted Critical
Publication of CN115811397B publication Critical patent/CN115811397B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a high-security server cipher machine, which relates to the technical field of cipher machines, and by generating a characterization data set with different data characteristics, the random numbers generated in an encryption module are guaranteed to be true random numbers.

Description

High-safety server cipher machine
Technical Field
The invention relates to the technical field of cipher machines, in particular to a high-security server cipher machine.
Background
The server cipher machine equipment has the functions of data encryption and decryption, signature verification, MAC, hash and the like, so that the security problems of confidentiality, integrity, validity, non-repudiation and the like of sensitive information can be solved for users. During the use process, the server cipher machine device uses the administrator lock to manage the device, such as administrator identity authentication, or uses the administrator lock to complete the operations of initializing the device, recovering the key and the like.
In order to improve the security in the transmission process, the cryptographic machine uses a mode of directly generating random numbers through a multipath physical noise source chip, calculates a data verification key according to a random number production key as a key factor, isolates the interference of operators and operation modes, improves the decoding difficulty, has certain repeatability because the random numbers generated by the physical noise source chip are influenced by environmental factors such as temperature, time, voltage, pressure, audio frequency and the like, and the random numbers are generated to follow certain algorithm simulation, the result is regular and circulated, and the repeated random number result is necessarily generated when repeated physical noise is received, so the conventional cryptographic machine performs polling detection on the random numbers and clears the repeated random numbers, but the polling process is long in time consumption and low in key verification efficiency.
Disclosure of Invention
In order to overcome the above-mentioned drawbacks, the present invention provides a high security server cryptographic engine to solve the above-mentioned technical problems.
A high security server cryptographic engine comprising:
the system comprises a command interface, an encryption module, a main control module and an encryption module, wherein the command interface and the encryption module are integrated on the main control module, the command interface is used for acquiring a physical random signal of target equipment, and the encryption module is connected with the encryption module.
Preferably, the encryption module comprises a first random number generator, a second random number generator, a Hopfield neural network module and a key bank, wherein the first random number generator generates a first random number based on a physical random signal, the Hopfield neural network module comprises a plurality of discrete Hopfield neural network circuits, each discrete Hopfield neural network circuit corresponds to one first random number one by one, each discrete Hopfield neural network circuit generates a characterization data set, the characterization data set is used for generating a received characterization signal of the first random number at the current t moment, the second random number generator generates a true random number according to the characterization signal, and the key bank is used for encrypting the random number to obtain an encrypted random number.
Preferably, the step of generating the characterization data set of the Hopfield neural network module includes:
step 1: presetting a virtual physical signal, training the virtual physical signal to generate a characterization task, and obtaining a corresponding task sample set;
step 2: and under the condition that the task sample sets are available, extracting the optimal value data from each task data set and reserving the optimal value data to obtain the characterization data set.
Preferably, the task sample set is available in the following cases: the samples in the sample set are all different.
Preferably, the time interval from the reception of the first random signal to the last random signal by the command interface is called a time stack learned by the Hopfield neural network, the Hopfield neural network modifies the characterization data set with the change of the time stack, and in the nth time stack, the Hopfield neural network accesses the N-th characterization data set.
Preferably, the step of modifying the characterization data set by the Hopfield neural network module over time stack change includes:
step 3: after the N-1 time stack is finished, presetting a virtual physical signal, training the virtual physical signal to generate an N-number characterization task, and obtaining a corresponding N-number task sample set; extracting optimal value data from each task data set to be reserved under the condition that the task sample set is available, and obtaining N-number characterization data sets;
step 4: after the N time stack is finished, presetting a virtual physical signal, training the virtual physical signal to generate an N+1 characterization task, obtaining a corresponding N+1 task sample set, adding the characterization data set of the N characterization task into the task sample set, and extracting and retaining optimal value data of each task data set under the condition that the N+1 task sample set is available, so as to obtain the N+1 characterization data set.
Preferably, the extracting of the data of optimal value includes:
step a: according to the N-number characterization data set, acquiring a feature grabber corresponding to the N-number characterization task, and adopting the feature grabber to grab the features of all sample data in the N+1-number sample data;
step b: calculating a characteristic mean value for each type of sample data according to the captured multiple sample data characteristics, and calculating Euclidean distances between the multiple sample data characteristics and the characteristic mean value;
step c: and reserving m sample data corresponding to the sample data features with the smallest Euclidean distance.
Preferably, the first random number generator and/or the second random number generator is one or more of a thermal noise random number generator, an oscillation sampling random number generator, a metastable random number generator or a chaotic random number generator.
Preferably, the master control module is configured to receive a task request sent by the target device through the command interface, and send the task data to an encryption module connected to the hub through the encryption module, where the task request includes a task type and task data.
The beneficial effects of the invention are as follows:
according to the method, the random numbers generated in the encryption module are all true random numbers by generating the characterization data sets with different data characteristics, and the characteristic distillation of the old data is adopted in the generation process of the characterization data sets, so that deviation generated in the training process is avoided, the training result is overlapped with the old data, meanwhile, the training process is separated from the encryption and decryption process by adopting a time stack as a separation mode, the data backtracking polling time in the encryption and decryption process is reduced, and the key verification efficiency of the cipher machine is effectively improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. Like elements or portions are generally identified by like reference numerals throughout the several figures. In the drawings, elements or portions thereof are not necessarily drawn to scale.
FIG. 1 is a schematic diagram of a high security server cryptographic engine provided by the present invention;
fig. 2 is a step diagram of generating a characterization data set by a high security server cryptographic machine.
Detailed Description
Embodiments of the technical scheme of the present invention will be described in detail below with reference to the accompanying drawings. The following examples are only for more clearly illustrating the technical aspects of the present invention, and thus are merely examples, and are not intended to limit the scope of the present invention.
It is noted that unless otherwise indicated, technical or scientific terms used herein should be given the ordinary meaning as understood by one of ordinary skill in the art to which this invention pertains.
As shown in fig. 1, a high security server crypto-engine includes the following:
the system comprises a command interface, an encryption module, a main control module and an encryption module, wherein the command interface and the encryption module are integrated on the main control module, the command interface is used for acquiring a physical random signal of target equipment, and the encryption module is connected with the encryption module.
The command interface may be a network interface including, but not limited to, an RJ-45 interface, an RJ-11 interface, an SC fiber interface, an FDDI interface, an AUI interface, a BNC interface, a Console interface; the first type of interface may also be a USB interface, including but not limited to a USB1.1 interface, a USB2.0 interface, a USB3.0 interface; the encryption module may be a network interface including, but not limited to, an RJ-45 interface, an RJ-11 interface, an SC fiber interface, an FDDI interface, an AUI interface, a BNC interface, a Console interface; the first type of interface may also be a USB interface, including but not limited to a USB1.1 interface, a USB2.0 interface, a USB3.0 interface; the number of the encryption modules is set according to actual needs, and is not limited herein.
More specifically, the encryption module comprises a first random number generator, a second random number generator, a Hopfield neural network module and a key library, wherein the first random number generator generates a first random number based on a physical random signal, the Hopfield neural network module comprises a plurality of discrete Hopfield neural network circuits, each discrete Hopfield neural network circuit corresponds to one first random number one by one, each discrete Hopfield neural network circuit generates a characterization data set, the characterization data set is used for generating a received characterization signal of the first random number at the current t moment, the second random number generator generates a true random number according to the characterization signal, and the key library is used for encrypting the random number to obtain an encrypted random number.
The first random number generator generates a first random number by adopting physical processes such as noise and the like in an electronic element of target equipment, and the first random number is influenced by environmental factors such as temperature, time, voltage, pressure, audio frequency and the like, so that repeated physical noise is easily generated in a short time under a continuous environment to generate the same random number, and therefore, a discrete Hopfield neural network circuit is adopted to generate a characterization data set with different data characteristics;
the first random number is combined with the characteristic data set to generate different characteristic signals, the characteristic data are difficult to be directly input into the random number generator to obtain random numbers, so that a series of random numbers which possibly exist repeatedly are generated by adopting the first random number, the random numbers are combined with the different characteristic data to obtain different characteristic signals, the characteristic signals are then input into the second random number generator to be used as input, and the random numbers generated in the second random number generator are all true random numbers.
As shown in fig. 2, more specifically, the step of generating the characterization data set of the Hopfield neural network module includes:
step 1: presetting a virtual physical signal, training the virtual physical signal to generate a characterization task, and obtaining a corresponding task sample set;
step 2: and under the condition that the task sample sets are available, extracting the optimal value data from each task data set and reserving the optimal value data to obtain the characterization data set.
More specifically, the task sample set is available in the following cases: the samples in the sample set are all different.
And a step of presetting a virtual physical signal, wherein the manufacturing process of the characterization data set is isolated from the encryption and decryption process before the encryption and decryption process is started by the crypto, so that the data backtracking polling time in the encryption and decryption process is reduced, the key checking efficiency of the crypto is effectively improved, and the characterization data set has perfect task data with enough data quantity.
More specifically, the time interval from the receipt of the first random signal to the last random signal by the command interface is referred to as a time stack learned by the Hopfield neural network, the Hopfield neural network modifies the characterization data set as the time stack changes, and in the nth time stack, the Hopfield neural network accesses the N-th characterization data set.
In the Nth time stack, the command interface starts timing after receiving the kth signal, and if the timing duration exceeds the set range and the next random signal is still not input, the kth signal is set as the last random signal of the Nth time stack;
if the timing duration exceeds the set range, the command interface receives a random signal, and the random signal is used as the first random signal of the (n+1) th time stack.
More specifically, the step of modifying the characterization data set by the Hopfield neural network module with time stack change includes:
step 3: after the N-1 time stack is finished, presetting a virtual physical signal, training the virtual physical signal to generate an N-number characterization task, and obtaining a corresponding N-number task sample set; extracting optimal value data from each task data set to be reserved under the condition that the task sample set is available, and obtaining N-number characterization data sets;
step 4: after the N time stack is finished, presetting a virtual physical signal, training the virtual physical signal to generate an N+1 characterization task, obtaining a corresponding N+1 task sample set, adding the characterization data set of the N characterization task into the task sample set, and extracting and retaining optimal value data of each task data set under the condition that the N+1 task sample set is available, so as to obtain the N+1 characterization data set.
After the virtual physical signal training is finished and a new task sample set is available, if the characterization data set is directly used for random number generation of the next time stack, the random number generation result of the next time stack is biased to the distribution of new data, so that overlapping with the previous time stacks is difficult to avoid. In order to alleviate this phenomenon, when generating the n+1 characterization task, the characterization data set of the old task N characterization task will participate in training together with the n+1 task sample set, and prevent the data from overlapping while retaining the knowledge of the old task.
More specifically, the extracting step of the data of optimal value includes:
step a: according to the N-number characterization data set, acquiring a feature grabber corresponding to the N-number characterization task, and adopting the feature grabber to grab the features of all sample data in the N+1-number sample data;
step b: calculating a characteristic mean value for each type of sample data according to the captured multiple sample data characteristics, and calculating Euclidean distances between the multiple sample data characteristics and the characteristic mean value;
step c: and reserving m sample data corresponding to the sample data features with the smallest Euclidean distance.
More specifically, the first random number generator and/or the second random number generator is one or more of a thermal noise random number generator, an oscillation sampling random number generator, a metastable random number generator or a chaotic random number generator.
More specifically, the main control module is configured to receive a task request sent by the target device through the command interface, and send the task data to an encryption module connected to the hub through the encryption module, where the task request includes a task type and task data.
When the task type is an encryption service, the encryption module encrypts the task type to obtain encryption information, the encryption information is sent to a main control module through a hub and the encryption module, and the main control module sends the encryption information to the target equipment through the command interface after receiving the encryption information;
and when the task type is decryption service, the encryption chip decrypts the task data to obtain decryption information, the decryption information is sent to a main control module through a hub and an encryption module, and the main control module sends the decryption information to the target equipment through the command interface after receiving the decryption information.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the invention, and are intended to be included within the scope of the appended claims and description.

Claims (6)

1. A high security server cryptographic engine comprising:
the system comprises a command interface, an encryption module, a main control module and an encryption interface, wherein the command interface and the encryption interface are integrated on the main control module, the command interface is used for acquiring a physical random signal of target equipment, and the encryption module is connected with the main control module;
the encryption module comprises a first random number generator, a second random number generator, a Hopfield neural network module and a key library, wherein the first random number generator generates a first random number based on a physical random signal, the Hopfield neural network module comprises a plurality of discrete Hopfield neural network circuits, each discrete Hopfield neural network circuit corresponds to one first random number one by one, each discrete Hopfield neural network circuit generates a characterization data set, the characterization data set is used for generating a received characterization signal of the first random number at the current t moment, the second random number generator generates a true random number according to the characterization signal, and the key library is used for encrypting the random number to obtain an encrypted random number;
the step of generating the characterization data set of the Hopfield neural network module includes:
step 1: presetting a virtual physical signal, training the virtual physical signal to generate a characterization task, and obtaining a corresponding task sample set;
step 2: extracting and retaining the optimal value data of each task data set under the condition that the task sample set is available, and obtaining a characterization data set;
the task sample set is available in the following cases: the samples in the sample set are all different.
2. The high security server cryptographic engine of claim 1, wherein the time interval from the receipt of the first random signal to the last random signal by the command interface is referred to as a time stack for Hopfield neural network learning, the Hopfield neural network modifying the characterization data set as a function of time stack, and the Hopfield neural network accessing the N-th characterization data set in the nth time stack.
3. The high security server cryptographic engine of claim 2, wherein the Hopfield neural network module modifies the characterization data set over time stack changes comprising:
step 3: after the N-1 time stack is finished, presetting a virtual physical signal, training the virtual physical signal to generate an N-number characterization task, and obtaining a corresponding N-number task sample set; extracting optimal value data from each task data set to be reserved under the condition that the task sample set is available, and obtaining N-number characterization data sets;
step 4: after the N time stack is finished, presetting a virtual physical signal, training the virtual physical signal to generate an N+1 characterization task, obtaining a corresponding N+1 task sample set, adding the characterization data set of the N characterization task into the task sample set, and extracting and retaining optimal value data of each task data set under the condition that the N+1 task sample set is available, so as to obtain the N+1 characterization data set.
4. A high security server cryptographic machine according to claim 3, wherein the step of extracting the data of optimal value comprises:
step a: according to the N-number characterization data set, acquiring a feature grabber corresponding to the N-number characterization task, and adopting the feature grabber to grab the features of all sample data in the N+1-number sample data;
step b: calculating a characteristic mean value for each type of sample data according to the captured multiple sample data characteristics, and calculating Euclidean distances between the multiple sample data characteristics and the characteristic mean value;
step c: and reserving m sample data corresponding to the sample data features with the smallest Euclidean distance.
5. The high security server cryptographic machine of claim 1, wherein the first random number generator and/or the second random number generator is one or more of a thermal noise random number generator, an oscillating sampling random number generator, a metastable random number generator, or a chaotic random number generator.
6. The high security server cryptographic engine of claim 1, wherein the master control module is configured to receive a task request sent by the target device through the command interface, and send the task data to an encryption module connected to the hub through the encryption module, wherein the task request includes a task type and task data.
CN202211455571.5A 2022-11-21 2022-11-21 High-safety server cipher machine Active CN115811397B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211455571.5A CN115811397B (en) 2022-11-21 2022-11-21 High-safety server cipher machine

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211455571.5A CN115811397B (en) 2022-11-21 2022-11-21 High-safety server cipher machine

Publications (2)

Publication Number Publication Date
CN115811397A CN115811397A (en) 2023-03-17
CN115811397B true CN115811397B (en) 2023-08-04

Family

ID=85483609

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211455571.5A Active CN115811397B (en) 2022-11-21 2022-11-21 High-safety server cipher machine

Country Status (1)

Country Link
CN (1) CN115811397B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110837651A (en) * 2019-11-04 2020-02-25 合肥工业大学 Color image encryption method based on fractional order discrete neural network and DNA operation
CN110943830A (en) * 2019-11-08 2020-03-31 深圳市东进技术股份有限公司 Cipher machine
CN111860774A (en) * 2020-06-30 2020-10-30 深圳市永达电子信息股份有限公司 True random number-based eigen state network circuit signal preparation system and method
CN113240100A (en) * 2021-07-12 2021-08-10 深圳市永达电子信息股份有限公司 Parallel computing method and system based on discrete Hopfield neural network
CN114826702A (en) * 2022-04-11 2022-07-29 中国南方电网有限责任公司 Database access password encryption method and device and computer equipment

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7003109B2 (en) * 2001-04-19 2006-02-21 City University Of Hong Kong Compact crypto-engine for random number and stream cipher generation
US11580411B2 (en) * 2018-12-18 2023-02-14 Hewlett Packard Enterprise Development Lp Systems for introducing memristor random telegraph noise in Hopfield neural networks

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110837651A (en) * 2019-11-04 2020-02-25 合肥工业大学 Color image encryption method based on fractional order discrete neural network and DNA operation
CN110943830A (en) * 2019-11-08 2020-03-31 深圳市东进技术股份有限公司 Cipher machine
CN111860774A (en) * 2020-06-30 2020-10-30 深圳市永达电子信息股份有限公司 True random number-based eigen state network circuit signal preparation system and method
CN113240100A (en) * 2021-07-12 2021-08-10 深圳市永达电子信息股份有限公司 Parallel computing method and system based on discrete Hopfield neural network
CN114826702A (en) * 2022-04-11 2022-07-29 中国南方电网有限责任公司 Database access password encryption method and device and computer equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《基于离散分数阶混沌系统的图像加密》;尹昊;《中国优秀硕士学位论文全文数据库》;全文 *

Also Published As

Publication number Publication date
CN115811397A (en) 2023-03-17

Similar Documents

Publication Publication Date Title
CN110324143B (en) Data transmission method, electronic device and storage medium
CN108092776B (en) System based on identity authentication server and identity authentication token
EP3319292B1 (en) Methods, client and server for checking security based on biometric features
CN106656907B (en) Method, device, terminal equipment and system for authentication
US5475758A (en) User authenticating system and method in wide area distributed environment
US11271759B2 (en) Secure digital signatures using physical unclonable function devices with reduced error rates
Wu A Real-World Analysis of Kerberos Password Security.
JP4638912B2 (en) Method for transmitting a direct proof private key in a signed group to a device using a distribution CD
CN109921894B (en) Data transmission encryption method and device, storage medium and server
US11477039B2 (en) Response-based cryptography using physical unclonable functions
EP2512061A1 (en) System for conducting remote biometric operations
JP2005012732A (en) Device authentication system, terminal device, authentication server, service server, terminal device method, authentication method, terminal device program, authentication program, service server program, and storage medium
WO2010130709A1 (en) Method for authenticating access to a secured chip by a test device
CN106034123A (en) Authentication method, application system server and client
CN110650011A (en) Encryption storage method and encryption storage card based on quantum key
CN114070559A (en) Industrial Internet of things session key negotiation method based on multiple factors
CN114793184B (en) Security chip communication method and device based on third-party key management node
CN113656775A (en) Offline password verification method and system with expiration date and intelligent lock
CN111327561B (en) Authentication method, system, authentication server, and computer-readable storage medium
CN113591103B (en) Identity authentication method and system between intelligent terminals of electric power Internet of things
Panchal et al. Designing Secure and Efficient Biometric-Based Access Mechanism for Cloud Services
CN112272090B (en) Key generation method and device
CN115811397B (en) High-safety server cipher machine
Yu et al. A new method for identity authentication using mobile terminals
WO2005091148A1 (en) Storing of encrypted data in the memory of a portable electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant