METHOD OF PREVENTING PRY FOR RANDOM ACCESS MEMORY
20170316218 · 2017-11-02
Inventors
- Shaw Hwa HWANG (Taipei City, TW)
- Bing Chih YAO (Taipei City, TW)
- Kuan Lin CHEN (Taipei City, TW)
- Yao Hsing CHUNG (Taipei City, TW)
- Chi Jung HUANG (Taipei City, TW)
- Cheng Yu YEH (Taipei City, TW)
- Shun Chieh CHANG (Taipei City, TW)
- Li Te SHEN (Taipei City, TW)
- Chao Ping CHU (Taipei City, TW)
- Ning Yun KU (Taipei City, TW)
- Tzu Hung LIN (Taipei City, TW)
- Ming Che YEH (Taipei City, TW)
Cpc classification
G06F21/79
PHYSICS
G06F21/6218
PHYSICS
H04L9/0631
ELECTRICITY
H04L9/302
ELECTRICITY
International classification
G06F21/62
PHYSICS
H04L9/30
ELECTRICITY
G06F21/79
PHYSICS
Abstract
The present invention provides a method of preventing pry for random access memory. A functional interface is designed between a computer program and a random access memory. When the computer program wants to store an original data into the random access memory, an encryption procedure is processed on the original data first, and then stoic into the random access memory for being an encrypted data. When the computer program ants to fetch related data float the random access memory, the functional interface is used to fetch the encrypted data for decryption, so that the original data is obtained for calculation.
Claims
1. A method of preventing pry for random access memory, a functional interface is designed between a computer program and a random access memory, when the computer program wants to store an original data into the random access memory, an encryption procedure is processed on the original data first, and then store into the random access memory for being an encrypted data; when the computer program wants to fetch related data from the random access memory, the functional interface is used to fetch the encrypted data for decryption procedure, so that the original data is obtained for calculation
2. The method of preventing pry for random access memory according to claim 1, herein the encryption procedure uses a specific encryption key for XOR operation on the original data to form the encrypted data; the decryption procedure uses the specific encryption key for XOR operation on the encrypted data to form the original data.
3. The method Pf preventing pry for random access memory according to claim 1, wherein the encryption procedure and the decryption procedure are performed in accordance with Data Encryption Standard (DES).
4. The method of preventing pry for random access memory according to claim 1, wherein the encryption procedure and the decryption procedure are performed in accordance with Advanced Encryption Standard (AES).
5. The method of preventing pry for random access memory according to claim 1, wherein the encryption procedure and the decryption procedure are performed in accordance with RSA Encryption Algorithm.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0012]
[0013]
[0014]
[0015]
[0016]
DETAILED DESCRIPTIONS OF THE PREFERRED EMBODIMENTS
[0017] Referring to
[0018] Referring to
[0019] 000 represents 0
[0020] 001 represents 1
[0021] 010 represents 2
[0022] 011 represents 3
[0023] 100 represents 4
[0024] 101 represents 5
[0025] 110 represents 6
[0026] 111 represents 7
[0027] In logic gate operation, there is an XOR operation, the rule thereof is: when two equal value of bits are operated by XOR, the result is 0; when two unequal value of bits are operated by XOR, the result is 1, as shown below:
[0028] 0 XOR 0=0
[0029] 1 XOR 0=1
[0030] 0 XOR 1=1
[0031] 1 XOR 1=0
[0032] XOR operation has reversibility. For example, if the data of computer equipment is 111, an encryption key 101 is XOR operated on 111, then:
[0033] If 010 is again XOR operated by the encryption key 101, the original data 111 is obtained, as shown below:
[0034] 010 XOR 101=111
[0035]
[0036] Having XOR operated by the encryption key, data will show irregularity, nonlinearity. Someone intends to pry the encrypted data by “fuzzy search” or “memory scanning”, the original data cannot be obtained. The data in random access memory XOR operated by the encryption key according to the present invention are ensured to be absolutely safe.
[0037] XOR operation by the encryption key is not the only method, other methods such as Data Encryption Standard (DES), Advanced Encryption Standard (AES) and RSA Encryption Algorithm are described as below.
[0038] Data Encryption Standard (DES) is the same as XOR encryption to be a symmetric-key block algorithm. Symmetric-key means that the encryption key is the same as the decryption key. DES uses 56 bits key, and is still a quite convenient encryption standard. DES employs a series of complicated operation on a data with fixed length to become an encrypted data with the same length. The block length of DES is 64 bits.
[0039] Advanced Encryption Standard (AES) is also called Rijndael Encryption algorithm. AES is used to complement DES, and is also a symmetric-key algorithm. AES has a fixed block length of 128 bits, but the key length can be 128, 192 or 256 bits. The AES encryption procedures are operated on a 4×4 bit matrix.
[0040] RSA Encryption Algorithm is a unsymmetric-key algorithm, and is much slower and more complicated than DES and other symmetric-key algorithms, but is ensured to be absolutely safe.
[0041] The speeds of the above-mentioned encryption algorithms for random access memory are XOR>DES>AES>RSA. If some data require calculation frequently, speed is the major concern to select ale encryption algorithm, such as the life value, time or ammunition of a game player.
[0042] If safety is the major concern, then RSA>AES>DES>XOR. When the data arc not changed frequently or just fetched statically, such as the number of credit card, the more complicated encryption algorithm had better to be employed.
[0043] The scope of the present invention depends upon the following claims, and is not limited by the above embodiments.