Unlock instant, AI-driven research and patent intelligence for your innovation.

Data anti-attack method, data anti-attack device, RSA modular exponentiation operation method, RSA modular exponentiation operation device and circuit

A computing method and anti-attack technology, applied in the field of data security, can solve problems such as security risks, improve security, reduce the possibility of key information, and avoid power consumption differences

Active Publication Date: 2015-04-29
SHANGHAI FUDAN MICROELECTRONICS GROUP
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the current computing circuit using the RSA algorithm, since the energy and time consumed when encrypting and decrypting different bits of the data are different, an attacker can often monitor and analyze these changes to crack The key information of the RSA algorithm, so the current computing circuit using the RSA algorithm has potential safety hazards

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data anti-attack method, data anti-attack device, RSA modular exponentiation operation method, RSA modular exponentiation operation device and circuit
  • Data anti-attack method, data anti-attack device, RSA modular exponentiation operation method, RSA modular exponentiation operation device and circuit
  • Data anti-attack method, data anti-attack device, RSA modular exponentiation operation method, RSA modular exponentiation operation device and circuit

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0067] refer to image 3 , the embodiment of the present invention provides a data attack defense method, the attack defense method may include the following steps:

[0068] Step 300: Obtain data;

[0069] Step 302: Write the value of the data bit to be judged in the data into the first register, the value of the data bit is the first value or the second value, and set the values ​​of other data bits in the first register to is the first value;

[0070] Wherein, the first register may be an ACC register.

[0071] The size of the data may be 1 byte, or data of other sizes, which can be selected by those skilled in the art according to the capability of the operation circuit applying the RSA algorithm. Taking the data size as 1 byte as an example, the data has 8 data bits in total, and the size of each data bit is 1 bit, then the data bit to be judged may be any one of the data.

[0072] After a certain bit of the data is processed by using the attack defense method describe...

Embodiment 2

[0093] refer to Figure 4 , this embodiment provides a data attack defense device 40, the device 40 may include:

[0094] The first writing unit 402 is used to write the value of the data bit to be judged in the data into the first register 410, the value of the data bit is the first value or the second value, and the value of the first register 410 The values ​​of other data bits are set as the first value;

[0095] A judging unit 404, configured to judge whether the value of the data bit in the first register 410 is an odd number of the second value;

[0096] The second writing unit 406 is used to write the second value into the second register 420 when the value of the data bit is an odd number of the second value, and when the value of the data bit is an odd number of the second value When the number is an even number, write the first value into the second register 420;

[0097] The reading unit 408 is configured to read the value of the second register 420, and use the...

Embodiment 3

[0103] refer to Figure 5 , this embodiment provides an RSA modular exponentiation circuit, and the RSA modular exponentiation circuit may include: a processor 50, a first register 510 connected to the processor 50, a first register 510 connected to the processor 50, Two registers 520, and a multiplier 530 connected to the processor 50.

[0104] In a specific implementation, the processor may include:

[0105] The first writing unit 502 is connected with the first register 510, and is used for writing the value of the data bit to be judged into the first register 510, and setting the values ​​of other data bits of the first register 510 to is the first value, the value of the data bit is the first value or the second value;

[0106] A judging unit 504, connected to the first register 510, for judging whether the value of the data bit in the first register 510 is an odd number of the second value;

[0107] The second writing unit 506 is connected with the judging unit 504 an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a data anti-attack method and a data anti-attack device. The method comprises the following steps that a value of a data bit to be judged in data is written into a first register, the value of the data bit is a first value or a second value, the value of other data bits of the first register is set to be the first value; whether the number of the values, of the data bit in the first register, being the second value is an odd number or not is judged; if the number of the values, of the data bits, being the second value is an odd number, the second value is written into a second register, and if the number of the values, of the data bits, being the second value is an even number, the first value is written into the second register; the value of the second register is read, the value of the second register is used as the value of the data bit to be judged. When the data anti-attack method is adopted, the power consumption difference due to the execution of different data bits can be effectively reduced, the possibility for obtaining the key information of an RSA algorithm through analyzing the power consumption change by an attacker is reduced, and the security of an operation circuit adopting the RSA algorithm is improved.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a data attack prevention method and device, and an RSA modular exponentiation method, device and circuit. Background technique [0002] The RSA algorithm is currently the most influential public key encryption algorithm and is widely used in smart cards and other fields. [0003] During the implementation of the RSA algorithm, a pair of keys needs to be generated for each user: a public key for encryption and a private key for decryption. Using the public key, the processed data can be encrypted to generate ciphertext. Using the private key, the ciphertext can be decrypted to obtain processed data. [0004] In the current computing circuit using the RSA algorithm, since the energy and time consumed when encrypting and decrypting different bits of the data are different, an attacker can often monitor and analyze these changes to crack The key information of the RSA algori...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6227
Inventor 闫守礼张志敏王立辉单伟君李清张纲刘枫
Owner SHANGHAI FUDAN MICROELECTRONICS GROUP