Elliptic curve anti-bypass attack method based on randomizing multiplication with symbol scalar

A technology of randomizing strips and elliptic curves, applied in the field of information security, can solve problems such as intermediate states, limited intermediate states, and intermediate state collision attacks.

Inactive Publication Date: 2008-06-11
SHANGHAI JIAO TONG UNIV
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Its disadvantage is that the intermediate state and the value of the intermediate state in the calculat

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Elliptic curve anti-bypass attack method based on randomizing multiplication with symbol scalar
  • Elliptic curve anti-bypass attack method based on randomizing multiplication with symbol scalar
  • Elliptic curve anti-bypass attack method based on randomizing multiplication with symbol scalar

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The embodiments of the present invention are described in detail below: the present embodiment is implemented under the premise of the technical solution of the present invention, and detailed implementation and specific operation process are provided, but the protection scope of the present invention is not limited to the following implementation example.

[0019] Assume that the embodiment intends to perform elliptic curve encryption processing on the plaintext M using the key k. According to the elliptic curve cryptosystem, the plaintext M is first converted into a point Q on a certain elliptic curve, and then the point representation of the ciphertext on the same elliptic curve is obtained by calculating the scalar multiplication P=kQ of the points on the elliptic curve. Under the whole invention realization process:

[0020] 1. First represent the key k in randomized BSD form. Suppose the binary representation of the key k is k = ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the information security technical field and provides an elliptical curve bypass attack-proof method based on the randomization tape symbol scalar multiplication. The elliptical curve bypass attack-proof method based on the randomization tape symbol scalar multiplication of the invention comprises the following steps that: firstly, a key in binary system is represented to be a randomization tape symbol binary number; secondly, a finite state machine for realizing the randomization tape symbol scalar product is obtained basing on a randomization addition and subtraction chains of the elliptical curve scalar product; finally, the elliptical curve scalar production operation is completed basing on the finite state machine and the improvement of the ability of the elliptical curve cryptograph to resist the bypass attack is realized. The invention which improves the security of the realization of the method can be applicable to the fields such as the cryptograph theory, the password cracking, the security chip design and the smart card design.

Description

technical field [0001] The invention relates to a method in the technical field of information security, in particular to an elliptic curve anti-side-channel attack method based on randomized signed scalar multiplication. Background technique [0002] With the development of password cracking technology, side-channel attacks pose a serious threat to embedded devices such as smart cards. Power consumption attack (PA) is an effective side-channel attack technology. This technology monitors the energy consumption of the smart card and uses statistical methods to recover the private key in the smart card within a limited number of cryptographic operations. information. Due to the superior performance of the Elliptic Curve Cryptography (ECC) system in terms of computing speed and security strength, the implementation of ECC on smart cards is more attractive, so research on ECC cryptographic algorithms that can effectively resist power consumption attacks is very important for im...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30G06F7/72
Inventor 张爱新周质彬
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products