Defense reverse engineering encryption method based on Camellia algorithm
An encryption method and reverse engineering technology, applied in the field of defense reverse engineering encryption based on Camellia algorithm, can solve the problems of hardware intellectual property obfuscation protection, hardware intellectual property security threats, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment
[0028] Embodiment: a kind of defense reverse engineering encryption method based on Camellia algorithm comprises the following steps:
[0029] ① Add an input port for inputting the 4-digit binary authorization key Key in the Camellia algorithm, and the Camellia algorithm is implemented with a hardware circuit structure;
[0030] ② Construct a confusing finite state machine for loading into the Camellia algorithm, the specific process is:
[0031] ②-1 Record the number of confused states of the confused finite state machine to be constructed as G, and G satisfies the condition: G+N=2 n , n is a positive integer and n is greater than or equal to the bit width of the binary code of the effective state of the original finite state machine in the Camellia algorithm, N is the number of effective states of the original finite state machine in the Camellia algorithm, and N is a constant 11;
[0032] ②-2 Calculate the decimal numbers corresponding to the binary codes of the N effectiv...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com