Method and System of Implementing Security Algorithm and Decryption Algorithm by Using Reconfigurable Processor
First Claim
1. A method of implementing a security algorithm by using a reconfigurable processor, comprising:
- determining a plurality of sub-algorithms for constructing the security algorithm; and
configuring the reconfigurable processor to implement the security algorithm according to a first configuration information of each sub-algorithm of the plurality of sub-algorithms and a first combination configuration information indicating a combination connection relationship of each of the sub-algorithms, wherein, the first configuration information includes a configuration information required by the reconfigurable processor to implement each sub-algorithm, and the first combination configuration information includes a configuration information required by the reconfigurable processor to implement the combination connection of the plurality of sub-algorithms;
the determining the plurality of sub-algorithms for constructing the security algorithm, comprises,computing a plurality of index values according to a dynamically changed signal source; and
determining the plurality of sub-algorithms for constructing the security algorithm according to the plurality of index values.
1 Assignment
0 Petitions
Accused Products
Abstract
The present disclosure provides a system and method of implementing a security algorithm using a reconfigurable processor, the method including: determining a plurality of sub-algorithms for constructing the security algorithm; and configuring the reconfigurable processor to implement the security algorithm according to a first configuration information of each sub-algorithm of the plurality of sub-algorithms and a first combination configuration information indicating a combination connection relationship of each of the sub-algorithms. The present disclosure also provides a system and method of implementing a decryption algorithm using a reconfigurable processor. Configuration of the reconfigurable processor according to the present disclosure can enable the security of the security algorithm and the security of the security algorithm implementation process to be ensured, the security risks of the sensitive data management and the risk of side channel attacks can be prevented, and the security is extremely high.
11 Citations
13 Claims
-
1. A method of implementing a security algorithm by using a reconfigurable processor, comprising:
-
determining a plurality of sub-algorithms for constructing the security algorithm; and configuring the reconfigurable processor to implement the security algorithm according to a first configuration information of each sub-algorithm of the plurality of sub-algorithms and a first combination configuration information indicating a combination connection relationship of each of the sub-algorithms, wherein, the first configuration information includes a configuration information required by the reconfigurable processor to implement each sub-algorithm, and the first combination configuration information includes a configuration information required by the reconfigurable processor to implement the combination connection of the plurality of sub-algorithms; the determining the plurality of sub-algorithms for constructing the security algorithm, comprises, computing a plurality of index values according to a dynamically changed signal source; and determining the plurality of sub-algorithms for constructing the security algorithm according to the plurality of index values. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9)
-
-
2. (canceled)
-
10. A method of implementing a decryption algorithm by using a reconfigurable processor, comprising:
-
determining a plurality of decryption sub-algorithms for decrypting a security algorithm; and configuring the reconfigurable processor to implement the decryption algorithm according to a second configuration information of each of the plurality of decryption sub-algorithms and a second combination configuration information indicating a combination connection relationship of each of the decryption sub-algorithms, wherein, the second configuration information includes a configuration information required by the reconfigurable processor to implement each decryption sub-algorithm, and the second combination configuration information includes a configuration information required by the reconfigurable processor to implement the combination connection of the plurality of decryption sub-algorithms; the determining the plurality of decryption sub-algorithms for decrypting the security algorithm, comprises, determining a plurality of sub-algorithms of the security algorithm according to a header information of a data packet to be decrypted; and selecting the plurality of decryption sub-algorithms corresponding to the plurality of sub-algorithms of the security algorithm from a second algorithm library according to the plurality of sub-algorithms of the security algorithm. - View Dependent Claims (12)
-
-
11. (canceled)
-
13. A computer readable storage medium having executable instructions stored thereon that, when executed by a processor, cause the processor to implement a method of implementing a security algorithm by using a reconfigurable processor, comprising:
-
determining a plurality of sub-algorithms for constructing the security algorithm; and configuring the reconfigurable processor to implement the security algorithm according to a first configuration information of each sub-algorithm of the plurality of sub-algorithms and a first combination configuration information indicating a combination connection relationship of each of the sub-algorithms, wherein, the first configuration information includes a configuration information required by the reconfigurable processor to implement each sub-algorithm, and the first combination configuration information includes a configuration information required by the reconfigurable processor to implement the combination connection of the plurality of sub-algorithms; the determining the plurality of sub-algorithms for constructing the security algorithm, comprises, computing a plurality of index values according to a dynamically changed signal source; and determining the plurality of sub-algorithms for constructing the security algorithm according to the plurality of index values; and
/orimplement a method of implementing a decryption algorithm by using a reconfigurable processor, comprising; determining a plurality of decryption sub-algorithms for decrypting a security algorithm; and configuring the reconfigurable processor to implement the decryption algorithm according to a second configuration information of each of the plurality of decryption sub-algorithms and a second combination configuration information indicating a combination connection relationship of each of the decryption sub-algorithms, wherein, the second configuration information includes a configuration information required by the reconfigurable processor to implement each decryption sub-algorithm, and the second combination configuration information includes a configuration information required by the reconfigurable processor to implement the combination connection of the plurality of decryption sub-algorithms; the determining the plurality of decryption sub-algorithms for decrypting the security algorithm, comprises, determining a plurality of sub-algorithms of the security algorithm according to a header information of a data packet to be decrypted; and selecting the plurality of decryption sub-algorithms corresponding to the plurality of sub-algorithms of the security algorithm from a second algorithm library according to the plurality of sub-algorithms of the security algorithm.
-
Specification