Cryptographic-equipment-oriented energy leakage acquisition method and system

A cryptographic device and energy leakage technology, applied in the field of information security, can solve problems such as physical security threats of embedded cryptographic devices, achieve effective resistance to energy analysis attacks, flexible sampling conditions, good scalability and configurability Effect

Inactive Publication Date: 2012-07-04
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF2 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Energy analysis attack is a typical side-channel cryptanalysis method, which has caused a serious threat to the physical security of embedded cryptographic devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cryptographic-equipment-oriented energy leakage acquisition method and system
  • Cryptographic-equipment-oriented energy leakage acquisition method and system
  • Cryptographic-equipment-oriented energy leakage acquisition method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] At the same time, the command line mode can be quickly integrated into other complex energy analysis systems as a tool software module. At the same time, for the fixed parameters that are often executed and set, it can be conveniently configured through XML files.

[0057] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0058] It first introduces the specific architecture of the system and the connection methods of each part of the system, then describes the detailed functions of each part, and finally introduces the workflow of the entire system.

[0059] The overall system consists of four parts: target device, sampling server, sampling client and oscilloscope. The overall structure and connection methods are as follows: figure 1 shown. The target device is connected to the sampling server through a serial port. The oscilloscope collects the energy leakage information of the target device through a di...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cryptographic-equipment-oriented energy leakage acquisition method and system, belonging to the technical field of information security. The method disclosed by the invention comprises the following steps that: (1) a sampling client-side resolves inputted command information to generate a sampling command sequence and sends the sampling command sequence to a sampling server; (2) the sampling server resolves the sampling command sequence to generate control information and sends the control information to an oscillograph or a cryptographic chip; (3) the cryptographic chip executes the received control information and generates a trigger signal, then, sends the executed result to the sampling server, and sends the trigger signal to the oscillograph; (4) the oscillograph executes the received control information, and carries out energy trace information acquisition on the cryptographic chip according to the trigger signal; and (5) the oscillograph sends acquired energy traces to the sampling client-side through the sampling server. The system disclosed by the invention comprises target equipment, the sampling client-side, the sampling server and the oscillograph. The cryptographic-equipment-oriented energy leakage acquisition method and the cryptographic-equipment-oriented energy leakage acquisition system contribute to the fast, accurate and effective evaluation of the energy analysis attack resistance of a cryptographic algorithm in the physics realization of embedded microprocessing.

Description

technical field [0001] The invention relates to a cryptographic device-oriented energy leakage collection method and system, belonging to the technical field of information security. Background technique [0002] The essence of information security is to protect information resources in information systems or information networks from various types of threats, interference and destruction, that is, to ensure the security of information. According to the definition of the International Organization for Standardization, the meaning of information security mainly refers to the integrity, availability, confidentiality and reliability of information. The foundation of modern information security is cryptography, and cryptographic algorithms are the cornerstone of building modern information security. [0003] According to Kirchhoff's principle, the security of a cryptographic algorithm depends only on the key and has nothing to do with the encryption algorithm itself, so protect...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
Inventor 杨树果周永彬曹雨晨刘继业
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products