Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Memory protection method based on unequal-length counter

A technology of memory protection and long counter, which is applied in the protection of internal/peripheral computer components, instruments, calculations, etc., and can solve the problem of consuming large main memory space

Inactive Publication Date: 2012-08-08
三亚哈尔滨工程大学南海创新发展基地
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Compared with methods such as ECB and CBC that directly encrypt data, counter mode encryption can hide the delay in decryption. It is the mainstream method of encryption at present and is widely used. However, this method requires each data block to have a unique counter value, which consumes a lot of money. of main memory

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Memory protection method based on unequal-length counter
  • Memory protection method based on unequal-length counter
  • Memory protection method based on unequal-length counter

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] to combine figure 1 . The upper part of the picture is the processor, which is the trusted zone, which can prevent software and hardware attacks. The processor has processor core, L2-cache, encryption engine and counter and other components. The lower part of the picture is the memory, which is the untrusted zone. May be attacked by hardware, it includes non-hot area and hot area, each area has multiple pages (Page), a page has multiple ciphertext blocks (EB) and counter value (ctr or ctr'), the hot area The space occupied is small, and the ctr is long; the non-hot area occupies a large space, and the ctr is short.

[0021] to combine figure 2 . Read the page and the corresponding counter value (ctr) from the non-hot area; use the non-hot area key to decrypt the page in counter mode to obtain the plaintext block; the counter (C) in the hot area generates a new counter value for each plaintext block in the page (ctr'); counter-mode encryption of a plaintext block wi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a memory protection method based on an unequal-length counter. Data are encrypted on the basis of counter mode encryption; the length of the counter is dynamically adjusted according to the internal memory access frequency; when the internal memory block access frequency is very high, the length of the counter is increased; when the internal memory block access frequency is very low, the length of the counter is decreased; and to realize a memory protection mechanism based on the unequal-length counter, three main processes, namely initialization, data block reading and writing, and data page migration need to be conducted. By adopting the memory protection method, the expense needed for storing the counter is reduced, and meanwhile, the overflowing time of the counter is decreased.

Description

technical field [0001] The invention relates to a computer security protection method, in particular to a memory protection method based on unequal-length counters. Background technique [0002] Data confidentiality refers to preventing attackers from illegally obtaining and understanding data. Data integrity refers to resisting active attacks by opponents and preventing unauthorized tampering of information. They are important research contents in the field of security architecture and storage security. [0003] The protection of data confidentiality is mainly through encryption, and encryption methods are mainly divided into symmetric key encryption and asymmetric key encryption. The former uses the same key for encryption and decryption; the latter uses different keys for encryption and decryption, that is, one public key and one private key. The symmetric key encryption method is divided into stream encryption and block encryption. The stream encryption uses bits as the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06F21/02G06F21/78
Inventor 姚念民马海峰
Owner 三亚哈尔滨工程大学南海创新发展基地
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products