[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN111756541A - Method, server, terminal and system for transmitting secret key - Google Patents

Method, server, terminal and system for transmitting secret key Download PDF

Info

Publication number
CN111756541A
CN111756541A CN201910231042.9A CN201910231042A CN111756541A CN 111756541 A CN111756541 A CN 111756541A CN 201910231042 A CN201910231042 A CN 201910231042A CN 111756541 A CN111756541 A CN 111756541A
Authority
CN
China
Prior art keywords
sequence
response
challenge
random number
auxiliary data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910231042.9A
Other languages
Chinese (zh)
Inventor
林贵同
曹攀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Puanxin Technology Co ltd
Original Assignee
Beijing Puanxin Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Puanxin Technology Co ltd filed Critical Beijing Puanxin Technology Co ltd
Priority to CN201910231042.9A priority Critical patent/CN111756541A/en
Publication of CN111756541A publication Critical patent/CN111756541A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3278Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0057Block codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0061Error detection codes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention provides a method, a server, a terminal and a system for transmitting a secret key, and the method is firstly applied to a server side and comprises the following steps: acquiring a response sequence in a challenge-response pair; acquiring a random number sequence; encrypting the response sequence according to the random number sequence to obtain auxiliary data; transmitting the challenge sequence and the assistance data in the challenge-response pair. Secondly, the method applied to the terminal comprises the following steps: receiving a challenge sequence and auxiliary data in a challenge response pair sent by a server side; generating a generation response sequence according to the challenge sequence through a non-duplicable functional chip; and recovering the auxiliary data according to the generated response sequence to obtain a random number sequence in the auxiliary data and a response sequence in the challenge response pair. By the aid of the transmission method, the PUF chip in key transmission has higher availability under different use environments.

Description

Method, server, terminal and system for transmitting secret key
Technical Field
The present invention relates to the field of information security technologies, and in particular, to a method, a server, a terminal, and a system for transmitting a key.
Background
A non-duplicable functional chip (PUF chip) is a physical analog signal function mapping relationship. The PUF chip is influenced by external environments such as temperature, mechanical stress and even cosmic rays, and even more, the functional relationship changes over time due to the aging of the device performance in the chip, so that the challenge response pair (CR pair) generated by the PUF chip in the using process has some differences from the CR pair registered on a data platform or a server, and the differences are usually small; but is unacceptable for PUF chips to be used for authentication and encryption. Authentication and encryption/decryption are performed in a pure digital operation state, digital keys have avalanche performance, and the authentication and encryption states can be changed completely through tiny differences. Therefore, the mapping characteristics of the PUF chip functions are slightly changed, and correction cannot be used without error correction.
Disclosure of Invention
Embodiments of the present invention provide a method, a server, a terminal, and a system for transmitting a secret key, so that a certain error can be allowed between a digitized CR pair generated by a PUF chip and a CR pair registered on the server in different usage environments, and the PUF chip can be used in different environments.
In order to achieve the above object, in one aspect, an embodiment of the present invention provides a method for transmitting a key, which is applied to a server, where the method includes:
acquiring a response sequence in a challenge-response pair;
acquiring a random number sequence;
encrypting the response sequence according to the random number sequence to obtain auxiliary data;
transmitting the challenge sequence and the assistance data in the challenge-response pair.
In another aspect, an embodiment of the present invention provides a method for transmitting a key, which is applied to a terminal, and the method includes:
receiving a challenge sequence and auxiliary data in a challenge response pair sent by a server side;
generating a generation response sequence according to the challenge sequence through a non-duplicable functional chip;
and recovering the auxiliary data according to the generated response sequence to obtain a random number sequence in the auxiliary data and a response sequence in the challenge response pair.
In another aspect, an embodiment of the present invention provides a server for transmitting a key, where the server includes:
a response sequence acquisition unit, configured to acquire a response sequence in the challenge-response pair;
a random number sequence acquisition unit for acquiring a random number sequence;
the data encryption unit encrypts the response sequence according to the random number sequence to obtain auxiliary data;
and an information sending unit, configured to send the challenge sequence and the auxiliary data in the challenge-response pair.
In another aspect, an embodiment of the present invention provides a terminal for transmitting a key, where the terminal includes:
the information receiving unit is used for receiving the challenge sequence and the auxiliary data in the challenge response pair sent by the server side;
a generated response sequence generating unit which generates a generated response sequence according to the challenge sequence through a non-duplicable functional chip;
and the data recovery unit recovers the auxiliary data according to the generated response sequence to obtain a random number sequence in the auxiliary data and a response sequence in the challenge response pair.
In another aspect, an embodiment of the present invention provides a system for transmitting a key, where the system includes the server for transmitting a key and the terminal for transmitting a key.
The technical scheme has the following beneficial effects: the invention ensures that a certain error can be allowed between the digital CR pair generated by the PUF chip under the using environment and the CR pair registered on the server through the encryption means of the response sequence in the random number sequence and the challenge response pair, so that the PUF chip can be used under different environments.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flow chart of a method of transferring a key according to an embodiment of the present invention;
FIG. 2 is a flow chart of a method of transferring a key according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of a server for transmitting a secret key according to an embodiment of the present invention;
FIG. 4 is a schematic structural diagram of a data encryption unit according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a terminal for transmitting a secret key according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a data recovery unit according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a flowchart of a method for transmitting a key according to an embodiment of the present invention, where the method is applied to a server, and the method includes:
s101, acquiring a response sequence in a challenge response pair;
s102, acquiring a random number sequence;
s103, encrypting the response sequence according to the random number sequence to obtain auxiliary data;
and S104, sending the challenge sequence in the challenge response pair and the auxiliary data.
Preferably, the encrypting the response sequence according to the random number sequence to obtain the auxiliary data includes:
coding the random number sequence by an error checking and correcting coding method to obtain a random number sequence with a check code;
and carrying out one-time pad encryption on the response sequence by utilizing the random number sequence with the check code to obtain auxiliary data.
Preferably, the error checking and correcting coding method is a binary linear code BCH error correction coding method or a low density parity check code LDPC code coding method.
At the server side, the response sequence R in the CR pair in which the challenge response pair has been registered is taken as follows:
Figure BDA0002006733600000031
taking a random number sequence RNG, and coding the random number sequence by an error checking and correcting coding method ECC coding method; the ECC encoding may be BCH error correction encoding obtained by a binary linear code BCH code encoding method, or an LDPC code obtained by a low density parity check code LDPC code encoding method, depending on the code length. The general challenge response sequence produced by PUF is short, BCH coding is only needed, and due to the good random performance of RNG sequence, the random number quality is high, and actually the random number is a high-quality key. The code length of the RNG can be equal to the code length R of the response sequence, and the helper data is actually a one-time encryption of the registered response sequence by the RNG, which is theoretically absolutely indecipherable if the key of the RNG is not taken according to shannon's theorem. Note that on the server side, the registered CR pairs and RNG sequences must be guaranteed not to be stolen by third parties, which is a significant requirement for security.
When a server serves as a request party to initiate a communication measurement request to a terminal PUF, a challenge sequence C and corresponding HelpData in a CR pair need to be sent in a challenge response mode.
As shown in fig. 2, which is a flowchart of a method for transmitting a key according to an embodiment of the present invention, applied to a terminal, the method includes:
s201, receiving a challenge sequence and auxiliary data in a challenge response pair sent by a server;
s202, generating a generation response sequence according to the challenge sequence through a non-duplicable functional chip;
s203, recovering the auxiliary data according to the generated response sequence to obtain a random number sequence in the auxiliary data and a response sequence in the challenge response pair.
Preferably, the recovering the auxiliary data according to the generated response sequence to obtain a response sequence in a challenge-response pair includes:
performing modulo-2 addition operation on the generated response sequence and the auxiliary data to obtain operated data;
decoding the calculated data through an error checking and correcting module to obtain a random number sequence and a random number sequence with a check code;
and performing modulo-2 addition operation on the random number sequence with the check code and the auxiliary data to obtain a response sequence in a challenge response pair.
After the PUF chip receives the challenge sequence C as a responder, a new generated response sequence R ' is generated by the PUF chip, please note that for a certain CR pair registered on the server, R ' generated when C is re-input to the PUF chip is not exactly equal to R, and may be more or less different, and R ' and R ≧ RNG | T (RNG | T) are modulo-2 added at the PUF chip end.
Make it
Figure BDA0002006733600000041
If R 'is very close to R, and the difference of the obtained (R' -R) is very small, then (RNG | T) can be decoded out by the decoding function of the corresponding ECC in the PUF chip to obtain RNG at the same time. Then (RNG | T) and HelpData are subjected to modulo-2 addition to obtain R, so that a response sequence which is completely the same as the response sequence registered by the server and corresponding to the challenge sequence is obtained at the terminal side of the PUF chip. Although there is some difference between the physically generated responses R' and R at the PUF chip side. The RNG and response sequence transmitted by the transmission method are alternatives as keys.
The following two points are noted here:
HelpData can be transmitted over the open channel, although it is generated by RNG and R, but does not contain any information that can be exploited for third party attacks, since it is theoretically absolutely indecipherable, corresponding to the one-time pad cipher demonstrated by Shannon.
② the difference between R' and R can not be too large, there are two factors limitation, the first is ECC error correction coding and decoding limitation. Secondly, the code length limit of R is limited, if the difference is too large, the probability is high, and one PUF chip collides with the CR characteristic of another PUF, so that the safety is influenced.
The decoding process at the end of the PUF chip utilizes the characteristic that R' is approximately equal to R, so that the security of the system depends on the uniqueness and unpredictability of the PUF.
The random number sequence RNG and the response sequence R which is the same as the random number sequence RNG and the response sequence R are obtained at the PUF end, and the key can be generated by the RNG or the R or the combination of the RNG and the R according to the convention of the server end and the PUF chip end.
This enables the server side and the PUF to have the same secret key for symmetric encryption/decryption or mutual authentication.
Corresponding to the above-mentioned embodiment of the method for transmitting a key applied to the server side, as shown in fig. 3, a schematic structural diagram of a server for transmitting a key according to an embodiment of the present invention is shown, where the server includes:
a response sequence acquiring unit 11, configured to acquire a response sequence in the challenge-response pair;
a random number sequence acquisition unit 12 for acquiring a random number sequence;
a data encryption unit 13 for encrypting the response sequence according to the random number sequence to obtain auxiliary data;
an information sending unit 14, configured to send the challenge sequence in the challenge-response pair and the auxiliary data.
Preferably, as shown in fig. 4, which is a schematic structural diagram of a data encryption unit according to an embodiment of the present invention, the data encryption unit 13 includes:
the encoding module 131 is configured to encode the random number sequence by an error checking and correcting encoding method to obtain a random number sequence with a check code;
the encryption module 132 performs one-time pad encryption on the response sequence by using the random number sequence with the check code to obtain the auxiliary data.
Corresponding to the above-mentioned embodiment of a method for transmitting a key applied to a terminal, as shown in fig. 5, a schematic structural diagram of a terminal for transmitting a key according to an embodiment of the present invention is shown, where the terminal includes:
an information receiving unit 21, configured to receive the challenge sequence and the auxiliary data in the challenge-response pair;
a generated response sequence generating unit 22 that generates a generated response sequence from the challenge sequence by using a non-duplicable functional chip;
and the data recovery unit 23 recovers the auxiliary data according to the generated response sequence to obtain a random number sequence in the auxiliary data and a response sequence in the challenge-response pair.
Preferably, as shown in fig. 6, which is a schematic structural diagram of a data recovery unit according to an embodiment of the present invention, the data recovery unit 23 includes:
a first operation module 231, configured to perform modulo-2 addition operation on the generated response sequence and the auxiliary data to obtain operated data;
a decoding module 232, configured to decode the calculated data through the error checking and correcting module to obtain a random number sequence and a random number sequence with a check code;
and a second operation module 233, configured to perform modulo-2 addition operation on the random number sequence with the check code and the auxiliary data to obtain a response sequence in a challenge-response pair.
It should be understood that the specific order or hierarchy of steps in the processes disclosed is an example of exemplary approaches. Based upon design preferences, it is understood that the specific order or hierarchy of steps in the processes may be rearranged without departing from the scope of the present disclosure. The accompanying method claims present elements of the various steps in a sample order, and are not intended to be limited to the specific order or hierarchy presented.
In the foregoing detailed description, various features are grouped together in a single embodiment for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that the claimed embodiments of the subject matter require more features than are expressly recited in each claim. Rather, as the following claims reflect, invention lies in less than all features of a single disclosed embodiment. Thus, the following claims are hereby expressly incorporated into the detailed description, with each claim standing on its own as a separate preferred embodiment of the invention.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. To those skilled in the art; various modifications to these embodiments will be readily apparent, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the disclosure. Thus, the present disclosure is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
What has been described above includes examples of one or more embodiments. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the aforementioned embodiments, but one of ordinary skill in the art may recognize that many further combinations and permutations of various embodiments are possible. Accordingly, the embodiments described herein are intended to embrace all such alterations, modifications and variations that fall within the scope of the appended claims. Furthermore, to the extent that the term "includes" is used in either the detailed description or the claims, such term is intended to be inclusive in a manner similar to the term "comprising" as "comprising" is interpreted when employed as a transitional word in a claim. Furthermore, any use of the term "or" in the specification of the claims is intended to mean a "non-exclusive or".
Those of skill in the art will further appreciate that the various illustrative logical blocks, units, and steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate the interchangeability of hardware and software, various illustrative components, elements, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design requirements of the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present embodiments.
The various illustrative logical blocks, or elements, described in connection with the embodiments disclosed herein may be implemented or performed with a general purpose processor, a digital signal processor, an Application Specific Integrated Circuit (ASIC), a field programmable gate array or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general-purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a digital signal processor and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a digital signal processor core, or any other similar configuration.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may be stored in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. For example, a storage medium may be coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC, which may be located in a user terminal. In the alternative, the processor and the storage medium may reside in different components in a user terminal.
In one or more exemplary designs, the functions described above in connection with the embodiments of the invention may be implemented in hardware, software, firmware, or any combination of the three. If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media that facilitate transfer of a computer program from one place to another. Storage media may be any available media that can be accessed by a general purpose or special purpose computer. For example, such computer-readable media can include, but is not limited to, RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store program code in the form of instructions or data structures and which can be read by a general-purpose or special-purpose computer, or a general-purpose or special-purpose processor. Additionally, any connection is properly termed a computer-readable medium, and, thus, is included if the software is transmitted from a website, server, or other remote source via a coaxial cable, fiber optic cable, twisted pair, Digital Subscriber Line (DSL), or wirelessly, e.g., infrared, radio, and microwave. Such discs (disk) and disks (disc) include compact disks, laser disks, optical disks, DVDs, floppy disks and blu-ray disks where disks usually reproduce data magnetically, while disks usually reproduce data optically with lasers. Combinations of the above may also be included in the computer-readable medium.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are merely exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (10)

1. A method for transmitting a key, applied to a server, the method comprising:
acquiring a response sequence in a challenge-response pair;
acquiring a random number sequence;
encrypting the response sequence according to the random number sequence to obtain auxiliary data;
transmitting the challenge sequence and the assistance data in the challenge-response pair.
2. A method for transmitting a key according to claim 1, wherein said encrypting the response sequence based on the random number sequence to obtain the auxiliary data comprises:
coding the random number sequence by an error checking and correcting coding method to obtain a random number sequence with a check code;
and carrying out one-time pad encryption on the response sequence by utilizing the random number sequence with the check code to obtain auxiliary data.
3. A method of transmitting a key according to claim 2, wherein the error checking and correcting coding method is a binary linear code BCH error correction coding method or a low density parity check code LDPC coding method.
4. A method for transmitting a key, applied to a terminal, the method comprising:
receiving a challenge sequence and auxiliary data in a challenge response pair sent by a server side;
generating a generation response sequence according to the challenge sequence through a non-duplicable functional chip;
and recovering the auxiliary data according to the generated response sequence to obtain a random number sequence in the auxiliary data and a response sequence in the challenge response pair.
5. The method of claim 4, wherein recovering the auxiliary data from the generated response sequence to obtain a response sequence in a challenge-response pair comprises:
performing modulo-2 addition operation on the generated response sequence and the auxiliary data to obtain operated data;
decoding the calculated data through an error checking and correcting module to obtain a random number sequence with a check code and a random number sequence;
and performing modulo-2 addition operation on the random number sequence with the check code and the auxiliary data to obtain a response sequence in a challenge response pair.
6. A server for transmitting a key, the server comprising:
a response sequence acquisition unit, configured to acquire a response sequence in the challenge-response pair;
a random number sequence acquisition unit for acquiring a random number sequence;
the data encryption unit encrypts the response sequence according to the random number sequence to obtain auxiliary data;
and an information sending unit, configured to send the challenge sequence and the auxiliary data in the challenge-response pair.
7. The server for transmitting a key according to claim 6, wherein the data encryption unit comprises:
the coding module is used for coding the random number sequence by an error checking and correcting coding method to obtain the random number sequence with a check code;
and the encryption module is used for carrying out one-time pad encryption on the response sequence by utilizing the random number sequence with the check code to obtain auxiliary data.
8. A terminal for transmitting a key, the terminal comprising:
the information receiving unit is used for receiving the challenge sequence and the auxiliary data in the challenge response pair sent by the server side;
a generated response sequence generating unit which generates a generated response sequence according to the challenge sequence through a non-duplicable functional chip;
and the data recovery unit recovers the auxiliary data according to the generated response sequence to obtain a random number sequence in the auxiliary data and a response sequence in the challenge response pair.
9. The terminal for transmitting the key according to claim 8, wherein the data recovery unit comprises:
the first operation module is used for performing modulo-2 addition operation on the generated response sequence and the auxiliary data to obtain operated data;
the decoding module is used for decoding the calculated data through the error checking and correcting module to obtain a random number sequence with a check code and a random number sequence;
and the second operation module is used for performing modulo-2 addition operation on the random number sequence with the check code and the auxiliary data to obtain a response sequence in the challenge response pair.
10. A system for transferring keys, characterized in that it comprises a server for transferring keys according to any one of claims 6 to 7 and a terminal for transferring keys according to any one of claims 8 to 9.
CN201910231042.9A 2019-03-26 2019-03-26 Method, server, terminal and system for transmitting secret key Pending CN111756541A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910231042.9A CN111756541A (en) 2019-03-26 2019-03-26 Method, server, terminal and system for transmitting secret key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910231042.9A CN111756541A (en) 2019-03-26 2019-03-26 Method, server, terminal and system for transmitting secret key

Publications (1)

Publication Number Publication Date
CN111756541A true CN111756541A (en) 2020-10-09

Family

ID=72672042

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910231042.9A Pending CN111756541A (en) 2019-03-26 2019-03-26 Method, server, terminal and system for transmitting secret key

Country Status (1)

Country Link
CN (1) CN111756541A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112737770A (en) * 2020-12-22 2021-04-30 北京航空航天大学 PUF-based network bidirectional authentication and key agreement method and device
TWI804439B (en) * 2021-12-21 2023-06-01 慧榮科技股份有限公司 Apparatus and method for detecting errors during data encryption

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090183248A1 (en) * 2004-10-04 2009-07-16 Koninklijke Philips Electronics, N.V. Two-way error correction for physical tokens
US20090217045A1 (en) * 2005-11-29 2009-08-27 Koninklijke Philps Electronics, N.V. Physical secret sharing and proofs of vicinity using pufs
US20120204023A1 (en) * 2009-10-21 2012-08-09 Christiaan Kuipers Distribution system and method for distributing digital information
WO2014192077A1 (en) * 2013-05-28 2014-12-04 三菱電機株式会社 Authentication processing device and authentication processing method
US8918647B1 (en) * 2013-11-10 2014-12-23 Sypris Electronics, Llc Authentication system
US20160156476A1 (en) * 2014-11-28 2016-06-02 Yong Ki Lee Physically Unclonable Function Circuits and Methods of Performing Key Enrollment in Physically Unclonable Function Circuits
US9703989B1 (en) * 2014-12-23 2017-07-11 Altera Corporation Secure physically unclonable function (PUF) error correction
CN107004380A (en) * 2014-10-13 2017-08-01 本质Id有限责任公司 Include the encryption device of the unclonable function of physics
CN107493171A (en) * 2016-06-13 2017-12-19 上海复旦微电子集团股份有限公司 Wireless radios, certificate server and authentication method
CN107924645A (en) * 2015-08-06 2018-04-17 本质Id有限责任公司 There is the unclonable encryption device of physics
CN109428712A (en) * 2017-08-24 2019-03-05 上海复旦微电子集团股份有限公司 Data Encrypt and Decrypt method and data Encrypt and Decrypt system

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090183248A1 (en) * 2004-10-04 2009-07-16 Koninklijke Philips Electronics, N.V. Two-way error correction for physical tokens
US20090217045A1 (en) * 2005-11-29 2009-08-27 Koninklijke Philps Electronics, N.V. Physical secret sharing and proofs of vicinity using pufs
US20120204023A1 (en) * 2009-10-21 2012-08-09 Christiaan Kuipers Distribution system and method for distributing digital information
WO2014192077A1 (en) * 2013-05-28 2014-12-04 三菱電機株式会社 Authentication processing device and authentication processing method
US8918647B1 (en) * 2013-11-10 2014-12-23 Sypris Electronics, Llc Authentication system
CN107004380A (en) * 2014-10-13 2017-08-01 本质Id有限责任公司 Include the encryption device of the unclonable function of physics
US20170310489A1 (en) * 2014-10-13 2017-10-26 Intrinsic Id B.V. Cryptographic device comprising a physical unclonable function
US20160156476A1 (en) * 2014-11-28 2016-06-02 Yong Ki Lee Physically Unclonable Function Circuits and Methods of Performing Key Enrollment in Physically Unclonable Function Circuits
US9703989B1 (en) * 2014-12-23 2017-07-11 Altera Corporation Secure physically unclonable function (PUF) error correction
CN107924645A (en) * 2015-08-06 2018-04-17 本质Id有限责任公司 There is the unclonable encryption device of physics
CN107493171A (en) * 2016-06-13 2017-12-19 上海复旦微电子集团股份有限公司 Wireless radios, certificate server and authentication method
CN109428712A (en) * 2017-08-24 2019-03-05 上海复旦微电子集团股份有限公司 Data Encrypt and Decrypt method and data Encrypt and Decrypt system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
吴缙: "基于PUF的可信根及可信计算平台架构设计", 《电子技术应用》 *
吴缙: "基于PUF的可信根及可信计算平台架构设计", 《电子技术应用》, 6 September 2018 (2018-09-06), pages 1 - 2 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112737770A (en) * 2020-12-22 2021-04-30 北京航空航天大学 PUF-based network bidirectional authentication and key agreement method and device
TWI804439B (en) * 2021-12-21 2023-06-01 慧榮科技股份有限公司 Apparatus and method for detecting errors during data encryption

Similar Documents

Publication Publication Date Title
US20220229727A1 (en) Encoding and storage node repairing method for minimum storage regenerating codes for distributed storage systems
WO2019153867A1 (en) Two-dimensional code generation and identification
US8510608B2 (en) Generating PUF error correcting code using redundant hardware
KR100887003B1 (en) Apparatus and method for protecting the integrity of data
US10650373B2 (en) Method and apparatus for validating a transaction between a plurality of machines
US20090063861A1 (en) Information security transmission system
JP5510590B2 (en) Transmission system, method and program
JP6588048B2 (en) Information processing device
CN103167490B (en) Wireless key distribution method, Apparatus and system
JP2013523043A (en) How to identify and protect the integrity of a source dataset
US20160344428A1 (en) Joint encryption and error correction encoding
US20120017086A1 (en) Information security transmission system
Hiller et al. Systematic low leakage coding for physical unclonable functions
CN111756541A (en) Method, server, terminal and system for transmitting secret key
CN111756540B (en) Ciphertext transmission method, terminal, server and system
TW202001920A (en) Method and apparatus for improved data recovery in data storage systems
KR101675674B1 (en) Quantum signature apparatus for quantum message
JP7429223B2 (en) Turbo product code decoding method, device, decoder and computer storage medium
KR101852526B1 (en) Method for managing encrypted file in mobile device and encrypted file management system having the same
US20160072624A1 (en) Encrypted text matching system, method, and computer readable medium
US20240275767A1 (en) Secure Data Exchange Using Format-Preserving Encryption
US20190349363A1 (en) Biometric authentication with enhanced biometric data protection
CN111756525B (en) Method, server, terminal and system for transmitting high-quality key
US20220358203A1 (en) Puf-rake: a puf-based robust and lightweight authentication and key establishment protocol
US20160080142A1 (en) Encrypted text matching system, method, and computer readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20201009

RJ01 Rejection of invention patent application after publication