当前位置:网站首页>Cryptography involved in IOT device end
Cryptography involved in IOT device end
2022-06-23 17:59:00 【fancyxu】
The main algorithms in cryptography :
- Single hash (md5,sha1,sha256): Ensure message integrity .
- Message authentication (hmac): Ensure the integrity and authenticity of the message .
- digital signature : Ensure message integrity 、 Authenticity and non repudiation .
- Pseudo-random number generation (ctr_drbg): Generating random numbers increases security .
- Symmetric encryption (aes): Encrypted communication message .
- Asymmetric encryption (ecc,rsa,dh): Encrypted communication message .
- Public key password (ecdh,rsa): Exchange key .
Internet of things device end application :
- ota Firmware verification : adopt Single hash algorithm (md5) Verify that the firmware is complete .
- mqtt Connect :
- certificate : adopt Public key cryptography obtain Secret key encryption , Conduct Symmetric encryption aes-cbc.
- psk: Find the key through the authentication message , Conduct Symmetric encryption signal communication .
- Dynamic registration : adopt Message authentication code algorithm Send dynamic registration message , adopt Symmetric encryption Decrypt the device information .
- tls: follow tls standard , Use the appropriate cryptographic suite .
common problem :
1. The difference between certificate encryption and key encryption ?
Certificate encryption consumes more resources (rom,ram), But because of the temporary key , It ensures forward safety .
2. What to do if the device key is leaked ?
The key should be properly and securely stored in the device , Soft reinforcement can be used according to safety 、TEE And security chip . If the device key is leaked , You need to delete the device information in the background , To protect data security .
边栏推荐
- Hands on data analysis unit 2 section 4 data visualization
- Revil - blackmail Virus Emergency Response
- torch学习(一):环境配置
- MySQL的 安裝、配置、卸載
- [go] calling Alipay to scan code for payment in a sandbox environment
- C. Phoenix and Towers-Codeforces Global Round 14
- How to use R language to draw scatter diagram
- B. AND 0, Sum Big-Codeforces Round #716 (Div. 2)
- Skills that all applet developers should know: applying applet components
- Illustration of mongodb cluster deployment principle (3)
猜你喜欢

Meituan Sanmian: how do you understand the principle of redis master-slave replication?

torch学习(一):环境配置

Hands on data analysis unit 2 section 4 data visualization

千呼万唤,5G双卡双通到底有多重要?

Self supervised learning (SSL)
![QT layout manager [qvboxlayout, qhboxlayout, qgridlayout]](/img/62/a0425a325f123ba91a7a69cf854d2c.png)
QT layout manager [qvboxlayout, qhboxlayout, qgridlayout]

酒店入住时间和离店时间的日期选择

Alien world, real presentation, how does the alien version of Pokemon go achieve?

Easyplayer mobile terminal plays webrtc protocol for a long time. Pressing the play page cannot close the "about us" page
![[network communication -- webrtc] analysis of webrtc source code -- supplement of pacingcontroller related knowledge points](/img/18/dda0c7fa33ee6cdf2bbb2f85099940.png)
[network communication -- webrtc] analysis of webrtc source code -- supplement of pacingcontroller related knowledge points
随机推荐
Async/await
Reinforcement learning series (I) -- basic concepts
Analytic analog-to-digital (a/d) converter
Thymeleaf - learning notes
Mobile SSH connection tool
Goframe framework: graceful closing process
What if the website is poisoned
ctfshow php的特性
ACM players take you to play with the array!
What is the mobile account opening process? Is it safe to open an account online now?
Discussion on five kinds of zero crossing detection circuit
论文阅读 (58):Research and Implementation of Global Path Planning for Unmanned Surface Vehicle Based...
Establishment and use of SSL VPN (OpenVPN)
Wechat applet: time selector for the estimated arrival date of the hotel
Illustration of mongodb cluster deployment principle (3)
hands-on-data-analysis 第二单元 第四节数据可视化
Postgresql_根据执行计划优化SQL
Programmers are very useful ten tool websites, which are worth collecting
Intranet penetration token stealing
High availability solution practice of mongodb advanced applications (4)