Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Bypass operator based elliptical curve anti-bypass attack method

An elliptic curve and side-channel attack technology, applied in the field of information security, can solve the problems of disturbing the middle execution sequence of elliptic curve cryptographic scalar point multiplication operations, wrong multiplying point-point addition operator module matrix, and the influence cannot be finally eliminated, etc. The effect of achieving, improving overall performance, and improving the ability to resist bypass supply

Inactive Publication Date: 2008-05-21
SHANGHAI JIAO TONG UNIV
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it is wrong to execute the elliptic curve point multiplication operation on the prime field according to the above scheme. Although the pseudo-operation added in this scheme disturbs the intermediate execution sequence of the elliptic curve cryptographic scalar point multiplication operation, these pseudo-operations will The results of the execution do not cancel each other out
The reason for the error is that the result registers used by several pseudo-operations are related to the operation registers used by some basic operations in the subsequent intermediate execution sequence, that is, the result register of a certain pseudo-operation is the operation of some subsequent basic operations Registers, so that the introduction of pseudo-operations changes the intermediate results of the execution sequence, and its impact cannot be eliminated, and thus the wrong doubling-dot-adding operator module matrix is ​​obtained

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bypass operator based elliptical curve anti-bypass attack method
  • Bypass operator based elliptical curve anti-bypass attack method
  • Bypass operator based elliptical curve anti-bypass attack method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The embodiments of the present invention are described in detail below: the present embodiment is implemented under the premise of the technical solution of the present invention, and detailed implementation and specific operation process are provided, but the protection scope of the present invention is not limited to the following implementation example.

[0024] Assume that the embodiment intends to perform elliptic curve encryption on the plaintext M using the key d. According to the elliptic curve cryptosystem, first convert the plaintext M to the elliptic curve E / F p :y 2 =x 3 The point P on +ax+b, and then by implementing the scalar multiplication operation Q=dP of points on the elliptic curve, the representation Q of the point of the ciphertext on the same elliptic curve is obtained. In the specific implementation, choose the prime number field F pThe parameters of the elliptic curve on can be fixed. For example, take the elliptic curve equation y 2 =x 3 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an ellipse curve method for anti bypass attack based on the bypass operator, belonging to the technical field of information security, which comprises the following steps: firstly the mistakes of the prior technical proposal are modified to get the correct bypass equivalent execution sequence of the doubled point-point addition operation of the ellipse curve in the finite field Fp and the bypass equivalent execution sequence is expressed as a correct operator module matrix of doubled point-point addition of the ellipse curve; then aiming at the code mechanism of the ellipse curve, an implementation scheme of the C++ software is made, and the core steps of the encryption and decryption of the code mechanism of the ellipse curve is achieved in the software technical proposal, namely, a scalar point multiplication operation of the ellipse curve based on the bypass operator in the finite field. The invention has an advantage of improving the anti bypass-attack ability of the code of the ellipse curve according to adding correct pseudo operation sequence.

Description

technical field [0001] The invention relates to a method in the technical field of information security, in particular to an elliptic curve anti-bypass attack method based on a bypass operator. Background technique [0002] Side channel attack (SCA) is an analysis technology based on physical characteristics. The attacker can use the characteristics of the operating environment to attack while obtaining the operating carrier of the cryptographic algorithm (computer, confidential machine, encryption box, smart card, etc.), so as to quickly obtain The key to decipher the entire cryptosystem. Elliptic Curve Cryptography (ECC) has the characteristics of short key, fast encryption and decryption speed, low power consumption, narrow bandwidth, and small storage space. It is usually used in mobile, handheld and other wireless devices. The use environment is relatively harsh and it is very vulnerable. . Therefore, it is imminent to study the high-performance elliptic curve cryptog...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/36H04Q7/38
Inventor 张爱新杨福祥
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products