Data security implementation method capable of resisting timing attacks and devices

A technology for data security and timing attack, applied in the field of modern cryptography, it can solve problems such as timing attack, achieve the effect of resisting timing attack, confidentiality protection and integrity protection, and is conducive to popularization and application

Active Publication Date: 2013-12-04
NEW H3C TECH CO LTD
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The use of MEE-CBC type algorithm suites in the prior art will lead to timing attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security implementation method capable of resisting timing attacks and devices
  • Data security implementation method capable of resisting timing attacks and devices
  • Data security implementation method capable of resisting timing attacks and devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] In this embodiment, it is assumed that the original message is 100 bytes, the MAC algorithm is HMAC-SHA (the output MAC length is 20 bytes), and the encryption algorithm is AES in CBC mode (the packet length is 16 bytes).

[0049] figure 2 It is a flow chart of this embodiment, and the technical solution of the present invention is described by taking the case of an algorithm suite applicable to all MEE-CBC types as an example, as figure 2 As shown, this embodiment includes the following steps:

[0050] Step 201: Calculate the length of the padding part of the original message.

[0051] In this step, the original message is 100 bytes, the MAC length is 20 bytes, the packet length of the encryption algorithm is 16 bytes, and the closest integer multiple of the encryption algorithm packet length is 128 bytes, so the data length of the padding part is 8 bytes.

[0052] Step 202: Fill data for the original message.

[0053] In this step, 8 bytes of stuffing data are f...

Embodiment 2

[0066] The technical solution in method embodiment 1 can be extended to a general solution for implementing MEE-CBC type algorithm suites in various security protocols. When it is specific to the application scenario of the TLS / SSL protocol, the present invention also provides an alternative solution to complete the defense timing The purpose of the invention of the attack, this scheme is shown in the second method embodiment, and this embodiment still uses the data parameters of the first method embodiment.

[0067] image 3 It is a flow chart of the method embodiment 2. This embodiment takes the application scenario of a specific TLS / SSL protocol as an example to demonstrate the technical solution of the present invention, including the following steps:

[0068] Step 301: Calculate the length L of the padding part of the original message.

[0069] In this step, the original message is 100 bytes, the MAC length is 20 bytes, the block length of the encryption algorithm is 16 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data security implementation method capable of resisting timing attacks and devices. The method is suitable for calculating a message authentication code MAC value for a raw message prior to encryption, and an algorithm kit in a cipher block chaining mode is adopted as an encryption algorithm. The method includes that an encapsulation device connects raw information, padding data and MAC values sequentially in series, the MAC values are MAC values of the raw information and the padding data, the sum of lengths of the raw information, the padding data and the MAC values is an integral multiple of the encryption algorithm block length, a message is encrypted and then sent to a de-encapsulation device, and the de-encapsulation device receives the encrypted message, decrypts the message, then extracts the raw message and the padding data, calculates the MAC value of the message, compares the MAC value to the MAC value carried by the encrypted message, judges that the message is not tampered if the MAC value and the MAC value carried by the encrypted message are the same, discards the message and returns error warning information to the encapsulation person otherwise. By the aid of the technical scheme, total time consumed by the de-encapsulation device for processing the encrypted message can be ensured to be the same, so that the timing attacks are resisted effectively, and confidentiality protection and integrality protection of the encrypted message are guaranteed.

Description

technical field [0001] The invention relates to modern encryption technology, in particular to a data security realization method and equipment capable of resisting timing attacks. Background technique [0002] Modern cryptography can provide confidentiality protection and integrity protection for data. Confidentiality protection can ensure that the content of the data will not be known by unauthorized personnel. Integrity protection can ensure that the content read by the data reader is exactly the same as the content written by the data writer (that is, it has not been tampered with). Security protocols using modern cryptography usually use encryption algorithms (such as Advanced Encryption Standard AES, triple data encryption algorithm 3DES, etc.) to complete confidentiality protection, and use Message Authentication Code (MAC, Message Authentication Code) algorithms (such as key-related Hash Operation Message Authentication Code-Message Digest Algorithm Fifth Edition H...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 孙鲁东
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products