Method and device for attacking secret key

A key and attacked technology, applied in the security field, can solve problems such as inability to fully test key security

Active Publication Date: 2014-02-05
中电科(北京)信息测评认证有限公司 +1
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides a method and device for attacking the key, which can solve the problem that the security of the key cannot be fully tested in the existing method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for attacking secret key
  • Method and device for attacking secret key
  • Method and device for attacking secret key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] The following embodiments of the present invention provide a method and device for attacking a key, which can fully test the security performance of the key.

[0075] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0076] Such as figure 1 As shown, the embodiment of the present invention provides a method for attacking a key, and the method includes:

[0077] Step 110, setting the length of the RSA cryptographic operation as t, using the attacked key to perform the RSA cryptographic operation on the data, and obt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a method and device for attacking a secret key. The method comprises the steps that the length of an RSA code operation is set to be t, and the RSA code operation is conducted on data through the attacked secret key, so that a first power consumption curve for the attacked secret key to conduct modular exponentiation is obtained; whether the RSA code operation in the first power consumption curve is implemented through hardware or not is analyzed through a simple energy SPA attack/analysis method, if yes, an attack is failed; if not, according to the number of execution times of modular multiplication in the first power consumption curve, a testing secret key is obtained, RSA code operation is conducted on same random data through the testing secret key and the attacked secret key, whether results are identical or not is judged, and if yes, the attack is successful; the RSA code operation is a standard RSA decoding operation or a signature operation which is implemented through modular exponentiation.

Description

technical field [0001] The invention relates to the field of security, in particular to a method and device for attacking keys. Background technique [0002] RSA (named after the names of three developers, Ron Rivest, Adi Shamirh, and LenAdleman, respectively, RSA for short) and ECC (Elliptic Curves Cryptography, Elliptic Curve Cryptography Algorithm) are relatively mainstream public key cryptography technologies in the field of information security. Various keys (Key) and smart cards based on RSA and ECC have been widely used in various fields such as finance, communication, social security, and transportation. In order to ensure the security of Key and smart card, various attack methods need to be studied. Currently popular attack methods include Side Channel Attack (SCA for short) and Fault Injection Attack (FIA for short), among which the SPA (Simple Power Attack / Analysis) in SCA attack And DPA (Differential Power Attack / Analysis, differential power attack / analysis) at...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L12/26
Inventor 谢蒂王亚伟王冠华李国俊汪朝晖
Owner 中电科(北京)信息测评认证有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products