A method of detecting sha-1 algorithm against differential fault attack

A differential fault attack and algorithm technology, applied in the field of information security, can solve problems such as hidden dangers of cryptographic equipment security, and achieve the effect of simple, easy and accurate implementation.

Inactive Publication Date: 2017-12-29
DONGHUA UNIV
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There is no public method in the prior art that can evaluate the ability of the SHA-1 algorithm to resist differential fault attacks, which brings hidden dangers to the security of cryptographic devices encapsulated with the SHA-1 algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of detecting sha-1 algorithm against differential fault attack
  • A method of detecting sha-1 algorithm against differential fault attack
  • A method of detecting sha-1 algorithm against differential fault attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the present invention more comprehensible, a preferred embodiment is described in detail below with accompanying drawings.

[0042] When using the SHA-1 algorithm to process the same message M, if the experimental execution environment is different, such as voltage, clock, temperature, radiation, light, and eddy current, the attacker can obtain the correct output under the same key K C and error output C * , by calculating the output difference value of these two values, namely Key information can be deduced. Attackers can induce faults during the operation of the processing equipment encapsulated with the SHA-1 algorithm, but they do not know the specific location of the fault and the specific error value, so the location of the fault at this stage becomes the key. To analyze the difference ΔC To obtain important information, the location where the fault is imported must be valid, otherwise, the fault imported this time will not affect the processin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a method for detecting SHA-1 algorithm against differential fault attack. Firstly, SHA-1 is used to process an input message; in the message processing stage, two kinds of controls are implemented on the execution environment, one is to control the processing process Run accurately and record the output result as C, the other is to ensure that the processing message is the same, artificially introduce faults in the process of processing, induce it to produce wrong output results, and record it as C*; By calculating the difference between C and C*, SHA-1’s ability to resist differential fault attacks is evaluated. If a fault is detected, the location of the fault can be deduced, and the validity of the fault location can be further judged. The method provided by the invention has the characteristics of being simple, fast, accurate and easy to implement, and provides a good theoretical basis for detecting the ability of the SHA-1 algorithm to resist differential fault attacks.

Description

technical field [0001] The invention relates to the technical field of information security, and specifically includes a method for detecting an SHA-1 algorithm against differential fault attacks, which is mainly applied to evaluating the security of products packaged with the SHA-1 algorithm. Background technique [0002] In today's era of rapid development of Internet and communication technology, a large amount of important information is stored in network servers, which brings convenience to people and also creates huge hidden dangers of information security. As far as the current status of cryptography research is concerned, although the security of the SHA-1 algorithm is constantly being questioned, the SHA-1 algorithm is still a reliable hash algorithm currently used. Digest has a stronger ability to resist attacks. Therefore, the SHA-1 algorithm is widely used in all walks of life by virtue of its good structural characteristics. [0003] Differential fault attack ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L29/06
Inventor 李玮曹艳琴张汶汶陶智王碧颖刘国华燕彩蓉
Owner DONGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products