期刊文献+

基于ARM的嵌入式软件加密方法设计与实现 被引量:2

Design and Implementation of Embedded Software Encryption Based on ARM
在线阅读 下载PDF
导出
摘要 针对空空导弹飞控软件加密的需求,在通用的ARM处理器平台下,提出并实现了符合SM4国家标准的软件加密方案。方案有效且易实施,在不需要增加额外硬件的情况下,实现了对核心部分的加密;通过采用与硬件芯片相关的信息作为秘钥,增加了破解难度,达到了不可被复制的目的。在某导弹ARM通用平台下,进行了二进制密文烧录,上电后解密再完全启动的流程,相对于明文启动,加密模块占用存储空间、处理器复位时间增加量均能满足系统启动要求。 In order to meet the encryption requirements of air-to-air missile flight control software,a software encryption scheme conforming to the SM4 national standard is proposed and implemented under the general ARM processor platform.This scheme is effective and easy to implement,achieving encryption of the core parts without the need for additional hardware;By using information related to the hardware chip as the secret key,the difficulty of cracking is increased,achieving the goal of being non-copyable.Under the ARM general platform of a certain missile,the process of binary ciphertext burning,decryption after power on,and complete startup was carried out.Compared to plaintext startup,the encryption module occupies storage space and the increase in processor reset time can meet the system startup requirements.
作者 杨鹏锐 YANG Peng-rui(China Air to Air Missile Research Institute,Luoyang 471000;Northwest Polytechnical University,Xi′an 710000,China)
出处 《航空计算技术》 2023年第5期48-51,共4页 Aeronautical Computing Technique
关键词 软件加密 秘钥 不可复制 二进制密文 software encryption secret key non-copyable binary ciphertext
  • 相关文献

参考文献5

二级参考文献25

  • 1徐礼荣.单片机破解的常用方法及应对策略[J].国外电子元器件,2004(9):63-65. 被引量:4
  • 2王平立,张红卫.基于MSP430的高速串行通信设计[J].单片机与嵌入式系统应用,2004,4(10):76-77. 被引量:2
  • 3杨振野,韦方明,陈坤城,谭光雷.电子产品硬件加密防盗版新方法[J].微计算机信息,2007,23(04X):90-92. 被引量:1
  • 4JR/T0055.4-2009银行卡联网联合技术规范第4部分:数据安全传输控制[S].中国银联.
  • 5Atmel. AT88SA100S Datasheet Mature[EB/OL]. [2013 - 04]. http://www, atmel, com.
  • 6Atmel. Designing with CryptoAuthentication Client Devices [EB/OL]. [2013 -04]. http://www, atmet, com.
  • 7Huang A.Hacking the Xbox:an introduction to reverse engi- neering[M].San Francisco,CA:No Starch Press,2003.
  • 8Yan C,Rogers B,Englender D, et al.Improving cost,per- formance, and security of memory encryption and authenti- cation[C]//Proc of the International Symposium on Com- puter Architecture,2006:1-12.
  • 9Gassend B, Suh G, Clarke D, et al.Caches and hash trees for efficient memory integrity verification[C]//Proc of the 9th International Symposium on High Performance Com- puter Architecture(HPCA-9) ,2003 : 1-14.
  • 10Suh G E, Clarke D, Gassend B, et al.Hardware mechanismsfor memory integrity checking, Technical Report MIT-LCS- TR-872[R].2002 : 1-17.

共引文献151

同被引文献17

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部