Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Design Method of Trust Chain Based on SM9 Cryptographic Algorithm

A design method and cryptographic algorithm technology, applied to key distribution, can solve the problems of configuration register reset, single definition of trust chain model, and increase the complexity of application process, so as to improve efficiency, ensure security and credibility, protect integrity and authenticity effect

Active Publication Date: 2021-03-16
成都三零嘉微电子有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional trust models such as figure 1 As shown, the definition of the traditional chain of trust model is relatively simple, and its basic functions are measurement, verification, and jumping. During the measurement verification process, the integrity of each component is verified by hash value
However, with the ever-changing requirements of products for information security, the security mechanism based on this way of transmitting the chain of trust has great security risks, including firmware modification, communication data being stolen, and configuration registers being reset
At present, relevant literature points out that the method of signing and verifying the signature using the common public key can effectively defend against such attacks, but the use of such methods must introduce the CA certificate management system, which increases the complexity of the application process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Design Method of Trust Chain Based on SM9 Cryptographic Algorithm
  • A Design Method of Trust Chain Based on SM9 Cryptographic Algorithm
  • A Design Method of Trust Chain Based on SM9 Cryptographic Algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings, but the protection scope of the present invention is not limited to the following description.

[0030] A new trust chain design method based on the SM9 cryptographic algorithm, the design process is as follows:

[0031] 1) Initialization

[0032] TPM chip factory initialization settings, according to the algorithm process of SM9, set the public parameters of SM9 key generation, signature algorithm, and verification signature algorithm;

[0033] 2) Create a key mapping table

[0034] TPM is used as the trusted center key generation center KGC, and the identity of a single component on the trust chain is marked as ID i , record the trusted path from the trusted root to the ordered node sequence of the module whose signature is currently being verified as IDT=(ID 1 , ID 2 ,...ID n ), before loading each component, the verifier first...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a novel trust chain design method based on an SM9 cryptographic algorithm, and the design flow comprises initialization, the building of a secret key mapping table, the generation of signature information and the measurement verification. The beneficial effects of the invention lie in that (1), the method protects the expected measure value of an entity through employing the digital signature technology based on identity recognition, and effectively protects the integrity and reality of the information of the entity; (2), the method directly takes TPM as a trusted rootunder the condition that no CA certificate system is introduced, and the SM9 cryptographic algorithm is introduced; TPM serves as a secret key generation center, thereby achieving the flow of the digital signature and the signature verification, and guaranteeing the safe and credible of the whole process.

Description

technical field [0001] The invention relates to the field of trusted computing, in particular to a design method for a novel trust chain based on the SM9 cryptographic algorithm. Background technique [0002] (1) Trust chain design technology [0003] The transmission of the trust chain has always been a research hotspot in the field of trusted computing. At present, the TPM2.0 standard is widely used in the world. The Trusted Computing Organization proposes a method that takes TPM as the root of trusted measurement and passes the measurement and trust before loading. The method, one-level verification and one-level trust, realizes the measurement and verification from the hardware root of trust to the software of the application program, ensures that each component is not tampered with in the process of trust chain transmission, and basically solves the problem of platform startup. security risks. Traditional trust models such as figure 1 As shown, the definition of the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0877H04L9/0894H04L9/3234H04L9/3247
Inventor 李雨励饶金涛李军梅瑞何卫国
Owner 成都三零嘉微电子有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products