Dot computation method capable of resisting simple current drain aggression

A calculation method and simple technology, applied in the field of secure execution of public key cryptography, can solve the problems of sacrificing efficiency and not being able to resist SPA attacks well, and achieve the effect of good security and calculation speed

Inactive Publication Date: 2009-05-20
TIANJIN UNIV
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It should be pointed out that these dot product calculation methods are often at the expense of efficiency
In addition, due to the development of SPA attack technology, many existing point product calculation methods are no longer able to resist SPA attacks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dot computation method capable of resisting simple current drain aggression
  • Dot computation method capable of resisting simple current drain aggression
  • Dot computation method capable of resisting simple current drain aggression

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Before further describing the technical solution of the present invention, the symbols used in the present invention will be described first.

[0028] B 1 AND B 2 Represents the binary string B of equal length 1 and B 2 Logical AND operation is performed on a bit basis, for example, 01011011AND11001101=01001001.

[0029] NOT B means to perform a bitwise logical NOT operation on the binary string B, for example, NOT10101101=01010010.

[0030] B 1 ‖B 2 Represents the binary string B 1 and B 2 Perform connection operation, for example, 01011011∥11001101=0101101111001101.

[0031] P 1 +P 2 Denotes the point P on the elliptic curve point group 1 and P 2 Perform point addition operation, in special cases when P 1 =P 2 , it is point doubling operation, that is, 2·P 1 .

[0032] sq (m) (P) means to do m times of doubling operations on the point P on the elliptic curve point group, for example, sq (3) (P)=2·(2·(2·P))=2 3 ·P.

[0033] represents the smalles...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of safety execution in a public key cipher system and relates to a dot product calculation method for resisting simple power consumption attack. When software / hardware cipher equipment potentially suffering the simple power consumption attack operates the public key cipher system, the following steps are carried out: a dot P and a dot product coefficient d meeting the requirement are read in an elliptic curve point group; a binary string of the coefficient d is divided into equilong binary substrings d1 and d2; a fixed from-right-to-left binary algorithm is used to calculate a dot product pair {d1.P, d2.P}={(d1 AND (NOT d2)+d1 AND d2).P, ((NOT d1)AND d2+d<1> AND d2).P}; according to a formula d.P=(d1 II d2).P =sq<(gamma k / 2>(d1.P)+d2.P, the value of the dot product d.P is calculated through the dot product pair {d1.P, d2.P}; a functor II expresses connection; and a functor sq<(m)>(P) expresses to have m times multiplication dot operation on the dot P of the elliptic curve point group. The calculation method has strong capacity for resisting SPA attack and simultaneously has rapid calculating speed.

Description

technical field [0001] The invention belongs to the field of safe execution of public key cryptosystem, and relates to integrated circuit safety technology. Background technique [0002] Elliptic curve public-key cryptosystems, such as the Elliptic Curve Digital Signature Algorithm (ECDSA), are designed on the basis of the discrete logarithm problem of elliptic curve point groups defined over finite fields. The biggest advantage of using elliptic curve point groups is that there is no discrete logarithm calculation method with sub-exponential time complexity like the index attack on the integer multiplication cyclic group. Therefore, while maintaining the same security strength, relatively small Small security parameters, thereby improving the execution performance of all aspects of the public key cryptosystem. In the elliptic curve cryptosystem, the point multiplication d·P is mainly calculated on a certain type of elliptic curve point group, where P is a point on the elli...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/30G06F7/72
Inventor 孙达志孙济洲张加万
Owner TIANJIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products