期刊文献+

一种基于国密算法和物理不克隆函数的安全并行总线 被引量:3

A Security Parallel Bus Based on National Cryptographic Algorithm and Physical Unclonable Function
下载PDF
导出
摘要 传统安全总线的安全机制一般采用固定存储密钥和国际密码算法,这种方式存在不可控因素和密钥被侵入攻击的安全风险,针对传统总线传输存在的风险问题,提出一种基于国密算法和物理不克隆函数的安全并行总线,该总线设计了一种环形振荡器物理不克隆函数和密钥生成机制,将物理不克隆函数结合随机数发生器由SM3密码算法生成密钥,采用国密SM4密码算法对总线上传输的数据进行加密,加密时为了安全因素采用随机数对明文进行填充,保证了总线数据传输的安全性。通过该安全机制实现的总线,能有效抵御侵入式分析,抵抗重放攻击,解决密钥易被破解问题,保证数据安全性和机密性。最后搭建了并行总线加密仿真平台,验证了该方案的可行性。 The fixed key and international cryptographic algorithm used in the traditional security bus have some uncontrollable factors and security risk in its design.A novel method of a security parallel bus is proposed to solve the security risk of traditional bus transmission.The key generation mechanism and ring oscillator physical unclonable function are designed in the security parallel bus.The key is generated by the SM3 algorithm with the input of the physical unclonable function and random number generator.The transmitting data on the bus is encrypted using SM4 algorithm.When encrypting,random numbers are used to fill plaintext for security reasons.These guarantee the security of bus data transmission.The bus implemented by this security mechanism can effectively resist the intrusive analysis,the replay attack,and the key cracking,thus ensure data security and confidentiality.At last,a bus encryption simulation platform is built up and the results are presented to validate the proposed method feasible.
作者 习伟 杜之波 吴震 兰天 李汶璐 XI Wei;DU Zhibo;WU Zhen;LAN Tian;LI Wenlu(Electric Power Research Institute,CSG,Guangzhou 510663,China;Digtal Grid Research Institute,CSG,Guangzhou 510663,China;School of Cybersecurity,Chengdu University of InformationTechnolgy,Chengdu 610225,China;Huada Semiconductor Co.,Ltd.,Shanghai 200120,China)
出处 《南方电网技术》 CSCD 北大核心 2020年第1期46-51,共6页 Southern Power System Technology
基金 国家重点研发计划(2018YFB0904900,2018YFB0904901) “十三五”国家密码发展基金资助项目(MMJJ20180224) 四川省重点研发项目(2019YFG0096)。
关键词 安全并行总线 物理不克隆函数 SM4密码算法 SM3密码算法 security parallel bus physical unclonable function SM4 algorithm SM3 algorithm
  • 相关文献

参考文献10

二级参考文献80

  • 1尹少平,董丹.Diffie-Hellman密钥交换协议设计与实现[J].电力学报,2006,21(1):9-12. 被引量:9
  • 2孙荣创,张蕾,王萍.浅谈单片机常见攻击技术及应对策略[J].中国科技信息,2006(16):124-124. 被引量:2
  • 3陈传波,祝中涛.RSA算法应用及实现细节[J].计算机工程与科学,2006,28(9):13-14. 被引量:25
  • 4SUH G E,CLARKE D,GASSEND B,et al.Efficient memory integrity verification and encryption for secure processors[C]//Proc of the 36th Annual IEEE/ACM International Symposium on Microarchitecture.New York:ACM Press,2003:339-349.
  • 5SHI W,LEE H S,GHOSH M,et al.High efficient counter mode security architecture via prediction and precomputation[C]//Proc of the 32nd International Symposium on High-Performance Computer Architecture.Washington DC:IEEE Computer Society,2005:14-24.
  • 6ROGERS B,CHHABRA S,SOLIHIN Y,et al.Using address independent seed encryption and Bonsai Merkle trees to make secure processors OS-and performance -friendly[C]//Proc of the 40th Annual IEEE/ACM International Symposium on Microarchitecture.New York:ACM Press,2007:183-196.
  • 7ZHANG You-tao,GAO Lan,YANG Jun,et al.SENSS:security enhancement to symmetric shared memory multi -processors[C]//Proc of the 11th International Symposium on High-Performance Computer Architecture.2005:352-362.
  • 8CLARKE D,DEVADAS S,van DIJK M,et al.Incremental multiset hash functions and their application to memory integrity checking[C]//Proc of the 9th Conference on Theory and Application of Cryptology and Information Security.Berling:Springer,2003:188-207.
  • 9ZHANG You-tao,YANG Jun,GAO Lan.Improving memory encryption performance in secure processor[J].IEEE Trans on Computers,2005,54(5):630-640.
  • 10ROGERS B,CHEN Y,CHHABRA S.Single-level integrity and confidentiality protection for distributed shared memory multiprocessors[C]//Proc of the 14th International Symposium on High Performance Computer Architecture.2008:161-172.

共引文献89

同被引文献36

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部