Unlock instant, AI-driven research and patent intelligence for your innovation.

Dot computation method capable of resisting simple current drain aggression

A calculation method and point product technology, which is applied in the field of secure execution of public key cryptography, can solve the problems of sacrificing efficiency and not being able to resist SPA attacks well, and achieve the effect of good security and calculation speed

Inactive Publication Date: 2011-04-13
TIANJIN UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It should be pointed out that these dot product calculation methods are often at the expense of efficiency
In addition, due to the development of SPA attack technology, many existing point product calculation methods are no longer able to resist SPA attacks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dot computation method capable of resisting simple current drain aggression
  • Dot computation method capable of resisting simple current drain aggression
  • Dot computation method capable of resisting simple current drain aggression

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Before further describing the technical solution of the present invention, the symbols used in the present invention will be described first.

[0028] B 1 AND B 2 Represents the binary string B of equal length 1 and B 2 Logical AND operation is performed on a bit basis, for example, 01011011AND11001101=01001001.

[0029] NOT B means to perform a bitwise logical NOT operation on the binary string B, for example, NOT10101101=01010010.

[0030] B 1 ||B 2 Represents the binary string B 1 and B 2 Perform connection operation, for example, 01011011||11001101=0101101111001101.

[0031] P 1 +P 2 Denotes the point P on the elliptic curve point group 1 and P 2 Perform point addition operation, in special cases when P 1 =P 2 , it is point doubling operation, that is, 2·P 1 .

[0032] sq (m) (P) means to do m times of doubling operations on the point P on the elliptic curve point group, for example, sq (3) (P)=2·(2·(2·P))=2 3 ·P.

[0033] represents the small...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of safety execution in a public key cipher system and relates to a dot computation method for resisting simple power consumption attack. When a software / hardware cipher equipment potentially suffering the simple power consumption attack operates the public key cipher system according to the following steps: reading a dot P and a dot coefficient d meeting the requirement in an elliptic curve point group; dividing a binary string of the coefficient d into equilong binary substrings d1 and d2; computing a dot pair {d1.P, d2.P}={(d1 AND (NOT d2)+d1 AND d2).P, ((NOT d1)AND d2+d1 AND d2).P} by a fixed from-right-to-left binary algorithm; according to a formula, computing the value of the dot d.P through the dot pair {d1.P, d2.P}; expressing connection by a function II; and expressing to have m times multiplication dot operation on the dot P of the elliptic curve point group by a function sq<(m)>(P). The computation method of the invention has stronger capacity for resisting SPA attack and simultaneously has rapider computing speed.

Description

technical field [0001] The invention belongs to the field of safe execution of public key cryptosystem, and relates to integrated circuit safety technology. Background technique [0002] Elliptic curve public-key cryptosystems, such as the Elliptic Curve Digital Signature Algorithm (ECDSA), are designed on the basis of the discrete logarithm problem of elliptic curve point groups defined over finite fields. The biggest advantage of using elliptic curve point groups is that there is no discrete logarithm calculation method with sub-exponential time complexity like the index attack on the integer multiplication cyclic group. Therefore, while maintaining the same security strength, relatively small Small security parameters, thereby improving the execution performance of all aspects of the public key cryptosystem. In the elliptic curve cryptosystem, the point multiplication d·P is mainly calculated on a certain type of elliptic curve point group, where P is a point on the elli...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L9/30G06F7/72
Inventor 孙达志孙济洲张加万
Owner TIANJIN UNIV