Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Attack test method and device

An attack detection and plaintext technology, applied in security devices, public keys for secure communications, digital transmission systems, etc., can solve the problems of high data frequency, increased error probability, and no SIM card, etc., to achieve reduction requirements, fast effect

Inactive Publication Date: 2009-11-25
GIESECKE & DEVRIENT (CHINA) INFORMATION TECH CO LTD
View PDF1 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when using this method, the SIM card may return an incorrect ciphertext, and re-authentication is required, so the network load increases and the error probability acceptable to the user will increase, and the attacker may directly use "3R-collision" which can be very effective implementation of cloning attacks
[0011] Chinese Patent Publication No. CN1941775, the title of the invention is "A Method and Device for Preventing Network Message Attacks". It is too large to be mistaken for attack data, resulting in misoperation, and this method is only used for network security detection, and has not been applied to the security field of smart cards such as SIM cards.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack test method and device
  • Attack test method and device
  • Attack test method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with the embodiments and accompanying drawings. Here, the exemplary embodiments and descriptions of the present invention are used to explain the present invention, but not to limit the present invention.

[0041] Embodiments of the present invention are provided. The present invention will be described in detail below in conjunction with the accompanying drawings.

[0042] Such as figure 2 Shown is the flow chart of the present invention, judging whether the received plaintext is data with a selected plaintext attack mode includes the following steps, step 201, receiving a plurality of plaintexts and storing them. Step 202, judging whether at least two of the plaintexts have only one bit difference or are completely the same. Step 203, if the above judgment is negative, output no attack signa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an attack test method and a device. The invention provides the attack test method aiming to solve chosen-plaintext attack of a key in an encryption algorithm of the prior art. The method comprises the following steps: receiving a plaintext; storing at least one part of the plaintext; judging whether the analogical number of the stored at least one part of the plaintext and other stored at least one part of the plaintext is more than or equal to a first threshold value; outputting a signal with an attack mode in the current plaintext if the analogical number is more than or equal to the first threshold value, otherwise, outputting a normal signal; and repeating the steps before the next plaintext comes. The method and the device have the advantages that the method and the device can test the inputting plaintext with obvious attack mode and avoid the chosen-plaintext attack on the key.

Description

technical field [0001] The invention relates to the field of security detection, in particular to the field of security detection of smart cards, and specifically relates to an attack detection method and device. Background technique [0002] In an encryption algorithm, a key is used to encrypt plaintext into ciphertext. Here, the term encryption algorithm is to be understood as an algorithm for calculating an identification code with respect to plaintext. Such an algorithm is also called a hash function with a key (cryptographic hash function). Here, the identification code of the plaintext is calculated from the plaintext using the key. In general, contrary to true encryption algorithms in the narrower sense, such functions cannot be reversed, ie decryption can no longer be performed. [0003] An encryption algorithm is used, for example, to authenticate a first instance against a second instance. To this end, for example, the first instance encrypts the plaintext it p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06H04W12/10H04L12/26H04L9/30H04W12/122
Inventor 周源远李军
Owner GIESECKE & DEVRIENT (CHINA) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products