Abstract: An embodiment of the present disclosure provide a key protection method, via setting that each core of the multi-core process may have one symmetric master key, dynamically obtaining the plaintext private key of the asymmetric algorithm via a decryption operation and using the Intel TSX, it may be ensured that the private key and the intermediate variables used in the computation process may be stored in the cache occupied by the operation core only in terms of the hardware level, which may prevent the attackers from stealing the private key from the physical memory and ensure the security of the implementation of the public-key cryptographic algorithm in the computer system.
Type:
Grant
Filed:
August 27, 2014
Date of Patent:
June 4, 2019
Assignee:
DATA ASSURANCE AND COMMUNICATION SECURITY RESEARCH CENTER, CHINESE ACADEMY OF SCIENCES
Abstract: An embodiment of the present disclosure provide a key protection method, via setting that each core of the multi-core process may have one symmetric master key, dynamically obtaining the plaintext private key of the asymmetric algorithm via a decryption operation and using the Intel TSX, it may be ensured that the private key and the intermediate variables used in the computation process may be stored in the cache occupied by the operation core only in terms of the hardware level, which may prevent the attackers from stealing the private key from the physical memory and ensure the security of the implementation of the public-key cryptographic algorithm in the computer system.
Type:
Application
Filed:
August 27, 2014
Publication date:
December 8, 2016
Applicant:
DATA ASSURANCE AND COMMUNICATION SECURITY RESEARCH CENTER, CHINESE ACADEMY OF SCIENCES