Anti-attack method and device in electronic component using Rivest-Shamir-Adleman (RSA) public-key encryption algorithm

An encryption algorithm and electronic component technology, applied in the field of attack prevention, can solve the problems of leaking the secret parameters of the decryption algorithm and the insecurity of the encryption system, and achieve the effect of defending against DPA attacks.

Active Publication Date: 2013-07-17
KTMICRO ELECTRONICS
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Attacks of the DPA type therefore make it possible to obtain additional information on the intermediate data processed by the microprocessor on the card during the execution of the encryption algorithm, which in some cases makes it possible to reveal the secret parameters of the decryption algorithm , making the encryption system insecure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-attack method and device in electronic component using Rivest-Shamir-Adleman (RSA) public-key encryption algorithm
  • Anti-attack method and device in electronic component using Rivest-Shamir-Adleman (RSA) public-key encryption algorithm
  • Anti-attack method and device in electronic component using Rivest-Shamir-Adleman (RSA) public-key encryption algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0056] Such as figure 1 As shown, it is a schematic flow chart of the first embodiment of the anti-attack method in the electronic component using the RSA public key encryption algorithm of the present invention. This method is adopted when the RSA decryption algorithm using the CRT is executed each time. The method converts the ciphertext c, Keys d, n, p, q are used as input, the method includes the following 8 steps:

[0057] Step 11, generate three random numbers: u, t, s;

[0058] Step 12, replace the ciphertext c with c'=c+u×n;

[0059] Step 13, calculate p'=p×t, q'=q×s;

[0060] Step 14, calculate cp'=c'modp' and cq'=c'modq';

[0061] Step 15. Calculate with

[0062] Step 16, calculate mp=cp' dp′ modp',mq=cq' dq′ modq';

[0063] Step 17, calculate m=mq+q×[(mp-mq)(q -1 modp)(modp)];

[0064] Step 18, replace m with mmodn;

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an anti-attack method and device in electronic component using an RSA public-key encryption algorithm. The method is used when a RSA decipherment algorithm using a Chinese remainder theorem is implemented each time, and according to the method, a ciphertext c and secret keys d, n, p and q serve as inputs. The method comprises the steps of generating three random numbers u, t and s; substituting c'=c+u*n for the ciphertext c; calculating according to formulas that p'=p*t and q'=q*s; calculating according to formulas that cp'=c'modp' and cq'=c'mod; calculating according to formulas that mp=cp'dp'modp' and mq=cq'dq'modq'; calculating according to formulas that m=mq+q*((mp-mq)(q-1modp)(modp)); and substituting mmodn for m, wherein p and q are two prime numbers of the same bit length and different values and are euler functions of n, p' and q' respectively. By the aid of the method and the device, a differential power analysis (DPA) attacker can not obtain secret parameters of the decipherment algorithm through extraneous information of intermediate data processed by a microprocessor effectively, so that defence against DPA attacks can be achieved.

Description

technical field [0001] The invention relates to the field of attack prevention, in particular to an attack prevention method and device in electronic components using an RSA public key encryption algorithm. Background technique [0002] The cryptographic system is divided into a private key cryptosystem and a public key cryptosystem. The symmetric encryption algorithm DES developed by the National Bureau of Standards and IBM in 1977 and the public key proposed by R.Rivest, A.Shair and L.Adleman in 1978 are used respectively. The encryption algorithm RSA is represented. The private key cryptosystem is neither good for key management nor good for digital signature, but its speed is high. Public-key cryptography can be used for key management and digital signatures, but at a lower speed. The mechanism of the public key cryptosystem is to generate a pair of keys for each user: a public encryption key and a private decryption key, and the private encryption key (referred to as:...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30G06F21/46
Inventor 刘忠志房伟如
Owner KTMICRO ELECTRONICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products