Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for implementing public key cryptography for resisting cold boot attack

A technology of public key cryptography and an implementation method, which is applied in the field of public key cryptography to resist cold-start attacks, and can solve the problems of complex calculation of public key cryptography, hidden security risks, key length, etc.

Active Publication Date: 2014-09-24
PEKING UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, compared with the simple and efficient symmetric cryptographic algorithm, the public key cryptographic algorithm often has complex calculations and long keys, and requires larger storage space and higher technical requirements for implementation. At present, there is no effective method in both academia and industry. Methods against cold-boot attacks against public-key cryptography
The public key cryptography algorithm is an important basis for various key exchange protocols, signature authentication protocols and other security frameworks, and has a wide range of applications. If the cold start attack against the public key cryptography system cannot be effectively solved, it will be for those who rely on these protocols. Information exchange in all walks of life poses serious security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing public key cryptography for resisting cold boot attack
  • Method for implementing public key cryptography for resisting cold boot attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The implementation conditions of the present invention are as follows:

[0045] ●Hardware: A computer system using a CPU with X86-64 architecture supporting AVX instruction set (Intel CPU after Sandy Bridge architecture or AMD CPU after Bulldozer architecture)

[0046] ●Software: an operating system that can modify and recompile the kernel source code

[0047] The specific implementation steps are as follows (process reference figure 1 ):

[0048] A. In order to prevent the codes of other parts of the system from using SSE or AVX instruction set to access the YMM register group, causing the private key to leak or be destroyed, the present invention needs to disable the system's support for SSE, AVX instruction set extensions, so that all the related functions except the present invention Except specific code, other any code all can not use the instruction in SSE, AVX instruction set extension to visit YMM register bank; The security threat of private key leakage also...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for implementing public key cryptography for resisting a cold boot attack. The method comprises the following steps that: support of a system for streaming single instruction multiple data (Simd) extensions (SSE) and advanced vector extensions (AVX) is disabled, and contents in a YMM register group are prevented from being exchanged into a memory by a system kernel during process switching; only registers of a central processing unit (CPU) instead of a memory is used to implement a public key encryption algorithm; system call is increased for setting a secret key, encrypting a private key, allocating resources and recycling resources; a function of recycling public key cryptography calculation resources which are allocated to a process is added at a position where an operating system recycles the resources when the process exits; and a user space process calls the system call to implement a public key cryptography algorithm which can resist a side channel attack aiming at the memory. By the method, the capability of resisting the side channel attack aiming at the memory can be increased for the public key cryptography algorithm on a computer which uses an X86-64 CPU hardware platform under the condition that additional hardware is not added, so that in the running process of a cryptosystem, the private key of the system cannot be leaked due to the side channel attack aiming at the memory.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a method for implementing public key cryptography against cold start attacks. Background technique [0002] In theory, the attack on the cryptographic system is generally carried out by analyzing the weakness of the cryptographic algorithm and brute force cracking the key. Since the security of mainstream cryptographic algorithms is often fully tested by academic research and industrial practice, and the length of the key used is often long enough, a successful attack often consumes a lot of time and computing resources, and its cost is far greater than the possible , thus ensuring the security of the cryptographic system. [0003] However, for the cryptographic system in actual deployment, its security is not only related to the security of the algorithm itself, but also depends on various factors such as the specific implementation of the algorithm and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30
Inventor 关志杨阳董秋香朱佳伟陈钟
Owner PEKING UNIV