Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for generating energy consumption information of instruction level password equipment

A cryptographic device and energy consumption technology, which is applied in the field of information security, can solve problems such as incompatibilities with energy analysis, inability to generate energy consumption information for microprocessors, and methods for generating energy consumption information that have not yet appeared.

Active Publication Date: 2014-09-24
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The traditional evaluation of actual cryptographic devices is quite expensive, because designers cannot evaluate the effectiveness of anti-defense countermeasures during the design process, and insecure defense countermeasures are likely to lead to the re-implementation of the entire development cycle; in the simulation tool With the support, energy analysis attack security detection can penetrate into the design of all levels, which can significantly reduce the development cycle and cost
[0005] However, up to now, there is no energy consumption information generation method suitable for energy analysis attacks, especially the lack of simulation tools with the ability to adapt to multiple energy models and the ability to describe different noise levels
SimplePower and JouleTrack are two typical energy consumption simulators at present. The application objects of the former are compilation optimization and architecture optimization, and do not meet the requirements of energy analysis attacks in terms of noise simulation; the latter claims to provide clock levels for various architectures. energy consumption information, but only C source files can be used as input, and energy consumption information cannot be generated in combination with the architecture of a specific microprocessor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating energy consumption information of instruction level password equipment
  • Method for generating energy consumption information of instruction level password equipment
  • Method for generating energy consumption information of instruction level password equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Taking the instruction-level energy consumption information generation of the cryptographic algorithm under the C51 architecture as an example, the present invention is mainly implemented in the following four basic steps.

[0046] (1) Precompile

[0047] Compile the assembly code whose input object is the cryptographic algorithm C51, and obtain the assembly instruction sequence of the source program. If the system input is a high-level language implementation code such as C of the cryptographic algorithm, the implementation code under the C51 instruction system with equivalent functions or the assembler code of other instruction systems can be obtained by using compilation tools such as Keil uVision.

[0048] (2) Instruction paving

[0049] Flatten non-sequentially executed instructions (for example, jump instructions) in the cryptographic algorithm assembly instruction sequence into sequentially executed instruction sequences. The instruction paving technology mainl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for generating energy consumption information of instruction level password equipment and belongs to the field of information security. The method comprises the following steps of: firstly, selecting one target password equipment, initializing a noise mode and an energy mode of each main physical unit in the password equipment and setting the energy consumption specific weight of each main physical unit; secondly, compiling a realization source program for the selected password algorithm to obtain an assembly instruction sequence; thirdly, identifying an instruction in the assembly instruction sequence by adopting a lexical analyzer and spreading a branch instruction and a loop command to instruction sequences which are sequentially executed; fourthly, simulating the execution of the spread instruction sequences and recording data processed by each main physical unit in the instruction execution process by an instruction simulation engine; and fifthly, mapping the recorded data processed in the execution process of each instruction into an energy consumption value of the instruction according to the initialized result to obtain energy consumption information of the target password equipment for operating the password algorithm. The method disclosed by the invention has the advantages of strong depiction capability, low resource expenditure and the like.

Description

technical field [0001] The invention relates to a method for generating energy consumption information of an instruction-level cryptographic device, which is used to generate the energy trace (energy consumption value curve) of the host cryptographic device based on a cryptographic algorithm, and the energy trace is used to evaluate the defense of the cryptographic algorithm against energy analysis attacks Capabilities belong to the field of information security technology. Background technique [0002] Side-Channel Attacks (Side-Channel Attacks) refer to the attack method that the attacker cracks the implementation of the cryptographic algorithm through the leakage of additional information generated during the execution of the cryptographic algorithm. In recent years, side-channel attack, as a new type of cryptanalysis method, has attracted extensive attention from the industry and academia, and has developed rapidly. Traditional cryptanalysis regards cipher implementatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F9/30G06F9/32G06F9/45
CPCY02B60/181Y02D10/00
Inventor 周永彬李建堂刘继业
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI