Safety modular exponentiation method for resisting energy analysis and fault attack

A technology of error attack and energy analysis, applied in the field of secure execution of public key cryptosystem, can solve the problem of low security and achieve the effect of improving algorithm performance

Inactive Publication Date: 2013-08-14
SHANGHAI AISINOCHIP ELECTRONICS TECH
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, many existing modular exponentiation operations often only consider resistance to energy analysis, but ignore resistance to error injection attacks, or vice versa, so the security is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety modular exponentiation method for resisting energy analysis and fault attack
  • Safety modular exponentiation method for resisting energy analysis and fault attack
  • Safety modular exponentiation method for resisting energy analysis and fault attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Embodiments of the present invention will be described in further detail below in conjunction with the accompanying drawings, but the present embodiments are not intended to limit the present invention, and any similar structures, methods and similar changes of the present invention should be included in the scope of protection of the present invention.

[0041] Such as figure 1 As shown, the present invention discloses a method for calculating a safe modular exponentiation against energy analysis and error attacks, the method comprising the following steps:

[0042] Step 1. Read the base M, the exponent E, and the modulus N;

[0043] Step 2, set the intermediate variable TmpM = M, TmpE = E, TmpR = 1;

[0044] Step 3. Corresponding hardware is set to realize this step 3. The hardware includes 5 SRAMs of 64×32 bit size, named as A, B, N, R, T SRAM respectively;

[0045] Write modulus N to N SRAM and start precomputation (its purpose is to calculate parameters Nacc and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safety modular exponentiation method for resisting energy analysis and fault attack. The safety modular exponentiation method includes the steps: reading a base number M, an index E and a modulus N; setting an intermediate variable TmpM=M, TmpE=E and TmpR=1; writing the modulus N into an NSRAM (non-volatile static random access memory), starting pre-computation and converting the TmpM and the TmpR into Montgomery numbers by the aid of an ASRAM (asynchronous static random access memory) and a BSRAM (burst static random access memory); randomly selecting a divisor D, updating TmpE=TmpE/D and computing the intermediate variable Rem=TmpEmodD; updating TmpR=TmpM^(Rem)*TmpRmodN and TmpM=TmpM^(D)modN according to a divisor remainder pair (D, Rem) if TmpE=0 and switching to the step of selecting the divisor; computing the intermediate variable TmpR1=TmpM^(Rem)*TmpRmodN according to a remainder Rem if TmpE=0; reloading the modulus N into the NSRAM and updating TmpR=TmpM^(Rem)*TmpRmodN according to the remainder Rem; comparing the TmpR1 with the TmpR and converting the TmpR into a general number command and outputting results if the TmpR1 is equal to the TmpR; and finishing the operation if the TmpR1 is unequal to the TmpR. By the safety modular exponentiation method, both energy attack and fault attack can be resisted.

Description

technical field [0001] The invention relates to the field of safe execution of a public key cryptosystem, in particular to a safe modular exponentiation calculation method resistant to energy analysis and error attacks. Background technique [0002] With the development and application of information technology, online transactions such as online banking, e-government and e-commerce have become more and more common, and the security problems brought about by it have become more and more serious. The information is encrypted. The traditional encryption algorithm uses a symmetric cryptosystem, and the two parties in the communication share the same key. Its advantage is that encryption is easy to implement with hardware, and the speed of encryption and decryption is very fast, but there are security risks, and the key is easy to be stolen during the exchange. . The modern public-key cryptosystem is an asymmetric cryptosystem, which only requires the exchange of keys to be au...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F7/72
Inventor 刘红明周玉洁
Owner SHANGHAI AISINOCHIP ELECTRONICS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products