Search

CN-119583051-B - Information security dependent secret key generation and injection method thereof

CN119583051BCN 119583051 BCN119583051 BCN 119583051BCN-119583051-B

Abstract

The invention relates to a key generation and injection method of information security dependence, which comprises the following steps of sending DID by an upper computer and reading information of a VCU, setting a key value to be updated and a corresponding Slot number by a user, filling script information into an upper computer script, running the script and generating corresponding dark text information, unlocking authority and injecting part of the dark text information into the VCU, analyzing the received dark text information by the VCU and generating a key value and contrast information to be updated, and comparing and judging to determine the update state of the key value. According to the key generation and injection method, in the encryption and decryption verification stage, aiming at the UID information unique to each piece of hardware, the key can be packaged into the independent secret text through the script and the generated secret text is unique, so that the risk of key cracking is reduced, and the possibility of interception and malicious tampering of vehicle-mounted data communication is reduced.

Inventors

  • ZHANG PENGCHENG
  • LIU HUI
  • ZHI HAITAO
  • HONG CHAO

Assignees

  • 卓云智能科技无锡有限公司

Dates

Publication Date
20260508
Application Date
20241120

Claims (9)

  1. 1. The key generation and injection method of information security dependence is characterized by comprising the following steps: The upper computer sends a data identifier DID and reads information of a vehicle control unit VCU; setting a key value to be updated and a corresponding key storage Slot bit Slot number by a user; filling script information into the script of the upper computer; Running a script and generating corresponding dark text information; Unlocking the authority and injecting part of the ciphertext information into the VCU, wherein the authority unlocking comprises the following steps: An extended session is entered into which the user is allowed to access, The seed is requested to be a seed, The transmission key is unlocked and, Unlocking is successful; VCU analyzes the received dark text information and generates key value and contrast information to be updated; and comparing and judging, and judging the updating state of the key value.
  2. 2. The method for generating and injecting an information security-dependent key of claim 1, wherein said information of said read VCU comprises both an unreliated VCU and an unreliated VCU.
  3. 3. The method for generating and injecting a key dependent on information security as claimed in claim 2, wherein said non-offline VCU reads UID identity information, and said offline VCU reads UID identity information and key update times CID information.
  4. 4. The method for generating and injecting an information security-dependent key of claim 3, wherein said script information comprises updated key values and corresponding Slot numbers, obtained UID identity information, CID information and secure hardware extension identifier FID information.
  5. 5. The method for generating and injecting an information security-dependent key of claim 4, wherein said CID is changed based on the number of times a key has been updated in a Slot corresponding to the updated key.
  6. 6. The method for generating and injecting an information security-dependent key of claim 5, wherein said ciphertext information comprises an analysis group and a comparison group, wherein said analysis group corresponds to said updated key value and to said updated Slot number and to said obtained UID identity information, respectively, and said comparison group corresponds to said CID information and said FID information, respectively.
  7. 7. The method for generating and injecting an information security-dependent key as claimed in claim 6, wherein said sending key is an original key prior to a key value to be updated in said unlocking.
  8. 8. The method for generating and injecting an information security-dependent key of claim 7, wherein said injecting part of the ciphertext information into the VCU is performed as an parsing group.
  9. 9. The method for generating and injecting an information security-dependent key as claimed in claim 8, wherein said determining the update status of the key value is by comparing said comparison set with said comparison information, and if the comparison set and the comparison information are identical, the key update is successful and stored, and if not, the key update fails.

Description

Information security dependent secret key generation and injection method thereof Technical Field The invention relates to the technical field of information security, in particular to a key generation and injection method for information security dependence. Background Along with the development of the automobile electronic and electric architecture, the vehicle-mounted communication technology is also continuously updated. The traditional vehicle-mounted communication technology can not meet the requirements of modern automobiles on the aspects of data transmission rate, safety, anti-interference performance and the like. Thus, a series of new vehicle-mounted communication technologies have been developed, such as CAN-FD (CAN with Flexible Data-Rate), vehicle-mounted ethernet, wireless Local Area Network (WLAN), vehicle-mounted communication network (V2V), vehicle-mounted to base station communication network (V2I), and vehicle-mounted to internet communication network (V2X). These technologies together constitute a vast hierarchy of modern vehicle-mounted communications. In the vehicle-mounted communication process, the safety problem of data is important. The prior art solves security problems by means of an Electronic Codebook (ECB) mode, a Cipher Block Chaining (CBC) and a mode Counter (CTR) mode, etc. However, the key management is poor, the encryption algorithm is vulnerable to the continuous upgrade of attack means, so that the data transmitted by communication are intercepted, and the traffic safety is threatened. In addition, the traditional secret text generated by the security key depends on unique UID information (15 Bytes in length) of each ECU, and if the corresponding secret text is calculated manually, the product shipment time is greatly increased, and the software updating efficiency is reduced. Disclosure of Invention In view of the foregoing drawbacks of the prior art, an object of the present invention is to provide a key generation and injection method for information security dependency, so as to solve one or more of the problems in the prior art. In order to achieve the above purpose, the technical scheme of the invention is as follows: An information security dependent key generation and injection method thereof comprises the following steps: the upper computer sends the DID and reads the information of the VCU; the user sets a key value to be updated and a corresponding Slot number; filling script information into the script of the upper computer; Running a script and generating corresponding dark text information; unlocking authority and injecting part of the ciphertext information into the VCU; VCU analyzes the received dark text information and generates key value and contrast information to be updated; and comparing and judging, and judging the updating state of the key value. Further, the information of the read VCU includes the VCU that is not offline and the VCU that is offline. Further, the VCU that has not been offline reads UID identity information, and the VCU that has been offline reads UID identity information and CID information. Further, the script information includes an updated key value, a corresponding Slot number, the obtained UID identity information, CID information, and FID information. Further, the CID varies based on the number of times the key has been updated in the Slot to which the key corresponds. Further, the ciphertext information comprises an analysis group and a comparison group, wherein the analysis group corresponds to the updated key value, the corresponding Slot number and the obtained UID identity information respectively, and the comparison group corresponds to the CID information and the FID information respectively. Further, the authority unlocking comprises the following steps: Entering an extended session; requesting a seed; Sending a key to unlock; The unlocking is successful. Further, in the sending key unlocking, the key is the original key prior to the key value needing to be updated. Further, the part of the dark text information is injected into the VCU, and the analysis group is injected. Further, the key value updating state is determined by comparing the comparison group with the comparison information, if the comparison group is consistent with the comparison information, the key updating is successful and stored, and if the comparison group is inconsistent with the comparison information, the key updating is failed. Compared with the prior art, the invention has the following beneficial technical effects: According to the key generation and injection method, in the encryption and decryption verification stage, the key can be packaged into the independent dark text through the script according to the UID information unique to each piece of hardware, the generated dark text is unique, the risk of key cracking is reduced, and the possibility of eavesdropping and malicious tampering of vehicle-mounted data communication is reduce