Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for implementing public key cryptography for resisting cold boot attack

A technology of public key cryptography and its implementation method, which is applied in the field of public key cryptography against cold start attacks, and can solve problems such as complex calculations of public key cryptography algorithms, potential safety hazards, and long keys

Active Publication Date: 2012-09-26
PEKING UNIV
View PDF2 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, compared with the simple and efficient symmetric cryptographic algorithm, the public key cryptographic algorithm often has complex calculations and long keys, and requires larger storage space and higher technical requirements for implementation. At present, there is no effective method in both academia and industry. Methods against cold-boot attacks against public-key cryptography
The public key cryptography algorithm is an important basis for various key exchange protocols, signature authentication protocols and other security frameworks, and has a wide range of applications. If the cold start attack against the public key cryptography system cannot be effectively solved, it will be for those who rely on these protocols. Information exchange in all walks of life poses serious security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing public key cryptography for resisting cold boot attack
  • Method for implementing public key cryptography for resisting cold boot attack
  • Method for implementing public key cryptography for resisting cold boot attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The implementation conditions of the present invention are as follows:

[0045] ●Hardware: A computer system that uses X86-64 architecture to support AVX instruction set CPU (Intel CPU after Sandy Bridge architecture or AMD CPU after Bulldozer architecture)

[0046] ●Software: operating system that can modify and recompile the kernel source code

[0047] The specific implementation steps are as follows (process reference figure 1 ):

[0048] A. In order to prevent other parts of the system from using the SSE or AVX instruction set to access the YMM register set, resulting in the disclosure or destruction of the private key, the present invention needs to disable the system’s support for the SSE and AVX instruction set extensions, so that in addition to those related to the present invention Except for the specific code, no other code can use the instructions in the SSE and AVX instruction set extensions to access the YMM register set; during process switching, the system genera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for implementing public key cryptography for resisting a cold boot attack. The method comprises the following steps that: support of a system for streaming single instruction multiple data (Simd) extensions (SSE) and advanced vector extensions (AVX) is disabled, and contents in a YMM register group are prevented from being exchanged into a memory by a system kernel during process switching; only registers of a central processing unit (CPU) instead of a memory is used to implement a public key encryption algorithm; system call is increased for setting a secret key, encrypting a private key, allocating resources and recycling resources; a function of recycling public key cryptography calculation resources which are allocated to a process is added at a position where an operating system recycles the resources when the process exits; and a user space process calls the system call to implement a public key cryptography algorithm which can resist a side channel attack aiming at the memory. By the method, the capability of resisting the side channel attack aiming at the memory can be increased for the public key cryptography algorithm on a computer which uses an X86-64 CPU hardware platform under the condition that additional hardware is not added, so that in the running process of a cryptosystem, the private key of the system cannot be leaked due to the side channel attack aiming at the memory.

Description

Technical field [0001] The invention belongs to the technical field of information security, and specifically relates to a method for implementing public key cryptography against cold start attacks. Background technique [0002] In theory, attacks on cryptographic systems are generally carried out through two methods: analysis of weaknesses in cryptographic algorithms and brute force cracking of keys. Because the security of mainstream cryptographic algorithms is often fully tested by academic research and industrial practice, and the length of the key used is often long enough, a successful attack often requires a lot of time and computing resources, and its cost is much greater than what is possible. The income of the password system is guaranteed. [0003] However, for the actual deployment of a cryptographic system, its security is not only related to the security of the algorithm itself, but also depends on the specific implementation of the algorithm and the software and har...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30
Inventor 关志杨阳董秋香朱佳伟陈钟
Owner PEKING UNIV