Paper
27 March 2024 A novel firmware secure transmission scheme based on SM2 threshold key agreement algorithm
Kun Wang, Shaofeng Gao, Xinze Chen, Yong Fu
Author Affiliations +
Proceedings Volume 13105, International Conference on Computer Graphics, Artificial Intelligence, and Data Processing (ICCAID 2023); 1310543 (2024) https://doi.org/10.1117/12.3026518
Event: 3rd International Conference on Computer Graphics, Artificial Intelligence, and Data Processing (ICCAID 2023), 2023, Qingdao, China
Abstract
During the process of embedded firmware upgrade, to protect the security of the firmware during transmission, this paper proposes an improved firmware transmission scheme based on the combination of the SM2 threshold key agreement algorithm. Between the server, client, and downloader, the SM2 key agreement algorithm is used to generate session key pairs to encrypt the firmware information, and the method of reinforcing and verifying re-transmission is adopted to ensure data security. In order to improve the security of the algorithm, a threshold algorithm is used in the key agreement process. The server acts as a trusted center to execute the threshold algorithm and divide the main secret private keys dA and dB. During the phase of key exchange, at least t+1 sub-secrets are required to recover the complete main secret. This paper successfully implements and verifies the feasibility of this scheme.
(2024) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Kun Wang, Shaofeng Gao, Xinze Chen, and Yong Fu "A novel firmware secure transmission scheme based on SM2 threshold key agreement algorithm", Proc. SPIE 13105, International Conference on Computer Graphics, Artificial Intelligence, and Data Processing (ICCAID 2023), 1310543 (27 March 2024); https://doi.org/10.1117/12.3026518
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Data transmission

Computer security

Information security

Data processing

Error control coding

Interpolation

Binary data

Back to Top