Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key generation method, device, computer equipment and storage medium

A key generation device and key generation technology, which are applied to an encryption device with a shift register/memory and key distribution, can solve the problems of low data security, insecure key information, and data security cannot be guaranteed. , to achieve the effect of reducing correlation, avoiding data insecurity, and reducing basis pair

Active Publication Date: 2021-08-17
RAMAXEL TECH SHENZHEN
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the above method, there is a hidden danger of key information being insecure by manually filling in the key table through software, and the AES key used is determined by the ID of the logical block address, and there are multiple logical block addresses using one The group key cannot fail to guarantee the security of the data in each logical block address. At the same time, the correlation and cardinality between the manually filled AES keys are relatively high, resulting in low data security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key generation method, device, computer equipment and storage medium
  • Key generation method, device, computer equipment and storage medium
  • Key generation method, device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0056] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0057] It should also be understood that the terminology used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a key generation method, device, computer equipment and storage medium. The method includes obtaining the ID of the logical block address; obtaining the product serial number and key length of the solid-state hard disk; using the ID of the logical block address and the product serial number and the length for key derivation processing to obtain the key. In the present invention, the key derivation process is performed on the product serial number, the set key length, and the ID of the logical block address in the meta-information header, and the process is performed by splicing and the national secret SM3 algorithm, without manually filling in the key table, not only by The ID of the logical block address determines the AES key used, combined with the product serial number and the set key length, it can avoid multiple logical block addresses using a set of keys, and avoid the cracking of the key table information. Data insecurity can also reduce the correlation and primacy between each group of AES keys.

Description

technical field [0001] The present invention relates to a solid-state hard disk, and more specifically refers to a key generation method, device, computer equipment and storage medium. Background technique [0002] Most of the encryption standards used by SSDs for data are Advanced Encryption Standards to ensure data security. The current AES (Advanced Encryption Standard, Advanced Encryption Standard) key is manually written into the key table through software, and manually updated and updated. Managed keys and key tables. The use process of the AES key is as follows figure 1 As shown, there are 32 sets of keys in the key table that need to be filled in manually, and one set of keys is used for every 8 logical block addresses. The AES key acquisition and use process is as follows: When the data needs to be encrypted and decrypted by AES, the ID field of the smallest mapping unit in the meta-information header is used to calculate the ID of the corresponding logical block ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/06
Inventor 马越冯元元周晨杰周强
Owner RAMAXEL TECH SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products