<listing id="73jbp"></listing>
    1. <dd id="73jbp"></dd>

          1. <th id="73jbp"></th>
            <button id="73jbp"></button>
            1. <span id="73jbp"></span>
              <dd id="73jbp"></dd>
              <tbody id="73jbp"></tbody>
              <tbody id="73jbp"></tbody>
              <span id="73jbp"></span>
              新聞資訊
              網站首頁 > 新聞資訊 >

              硬件加密狗原理有哪些?

              2021-10-06 16:05:24 來源:http://www.eboudy.com/ 53

              硬件加密狗的應用程序接口基本上都是公開的。隨著解密技術的發展,單片機加密狗由于其算法簡單,存儲空間小,容易被硬件復制等原因,正逐漸被市場所淘汰。“代碼移植”加密原理為一種全新的、可信的軟件保護模型,軟件中部分代碼經過編譯,“移植”到加密鎖硬件內部,軟件中沒有該段代碼的副本。在這套軟件保護方案中,PC端應用軟件的關鍵的代碼和數據“消失”了,被安全地移植到加密鎖的硬件中保護起來。
              The application program interfaces of hardware dongles are basically public. With the development of decryption technology, MCU dongle is gradually eliminated by the market because of its simple algorithm, small storage space and easy to be copied by hardware. The encryption principle of "code migration" is a new and reliable software protection model. Some codes in the software are compiled and "transplanted" into the encryption lock hardware. There is no copy of this code in the software. In this software protection scheme, the key codes and data of PC application software "disappear" and are safely transplanted to the hardware of encryption lock for protection.
              目前全球先進的浙大中控加密狗中引入了雙算法安全通道技術,在通訊中同時采用128位AES算法及160位ECC算法作為通訊加密手段,每一次數據傳輸都用128位隨機密鑰AES算法對其加密,而這個隨機的密鑰又用160位ECC算法加密,在隨后傳輸。
              At present, the world's advanced Zheda central control dongle has introduced the dual algorithm secure channel technology. In the communication, 128 bit AES algorithm and 160 bit ECC algorithm are used as communication encryption means at the same time. Each data transmission is encrypted with 128 bit random key AES algorithm, and the random key is encrypted with 160 bit ECC algorithm for subsequent transmission.
              由于ECC是非對稱算法,加密和解密的密鑰并不相同,如果其中一組密鑰可以用黑客手段從內存中獲得,那么另外一組燒錄在硬件狗中的密鑰,黑客無法獲得。無法獲得兩對ECC密鑰,也就無法破解ECC加密的數據,從而無法獲得AES密鑰,也就無法破解整個通訊過程。這一雙算法安全通道技術徹底解決了通訊監聽破解的難題,傳統的對稱算法加密,黑客只要從內存中獲得其加密密鑰,就可以破解整個通訊過程。
              Because ECC is an asymmetric algorithm, the encryption and decryption keys are different. If one group of keys can be obtained from memory by hackers, the other group of keys burned in the hardware dog cannot be obtained by hackers. If two pairs of ECC keys cannot be obtained, the ECC encrypted data cannot be cracked, the AES key cannot be obtained, and the whole communication process cannot be cracked. This dual algorithm secure channel technology completely solves the problem of communication monitoring and cracking. With the traditional symmetric algorithm encryption, hackers can crack the whole communication process as long as they obtain their encryption key from memory.
              產品推薦
              新聞推薦