Method for attacking elliptical curve encryption algorithm and attacking device

An elliptic curve encryption and attack device technology, applied in the field of information security, can solve the problems of difficult to control the timing of error injection, injection errors, and low attack efficiency.

Active Publication Date: 2015-06-17
DATANG MICROELECTRONICS TECH CO LTD +1
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0020] In the existing method of attacking the elliptic curve encryption algorithm, due to the requirement for the realization of scalar multiplication, binary algorithm, constant doubling and dot adding, Montgomery algorithm, etc. must be used to realize it, and the timing of error injection is difficult to control (that is, only in Error injection during the process of expanding the intermediate value λ), you also need to know which iteration of the scalar multiplication to inject the error, and only 1 bit of the key can be attacked at a time, and multiple attacks are required to obtain the complete key , so the attack efficiency of this method is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for attacking elliptical curve encryption algorithm and attacking device
  • Method for attacking elliptical curve encryption algorithm and attacking device
  • Method for attacking elliptical curve encryption algorithm and attacking device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0078] In order to facilitate the understanding of those skilled in the art, the present invention will be further described below in conjunction with the accompanying drawings, which cannot be used to limit the protection scope of the present invention. It should be noted that, in the case of no conflict, the embodiments in the present application and various manners in the embodiments can be combined with each other.

[0079] see figure 1 , the present invention proposes a method of attacking the elliptic curve encryption algorithm, comprising:

[0080] Step 100, the attacking device obtains in advance the correspondence between the coordinates of the wrong base point with a one-byte error, the curve parameters of the elliptic curve where the wrong base point is located, and the order of the wrong base point.

[0081] In this step, the order is the order in which the length of the largest prime factor is less than or equal to a preset threshold.

[0082] In this step, the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for attacking the elliptical curve encryption algorithm and an attacking device. The method comprises the steps that the attacking device acquires the corresponding relation between the coordinates of an error base point with one byte error, parameters of an elliptical curve where the error base point is located and order in advance, wherein the order meets the condition that the length of a maximum prime factor is smaller than or equal to a preset threshold value; the attacking device injects one byte error into the coordinates of a base point of an elliptical curve used by the elliptical curve encryption algorithm in an encryption unit to obtain the coordinates of the error base point; the attacking device controls the encryption unit to encrypt a plaintext by means of the elliptical curve encryption algorithm according to the coordinates of the error base point so that error ciphertext output can be obtained; the attacking device calculates the parameters of the elliptical curve where the error base point is located according to the error ciphertext output and finds the coordinates and order of the error base point corresponding to the curve parameters in the corresponding relation; the attacking device acquires the plaintext according to the coordinates and order of the error base point, the curve parameters obtained through calculation, and error ciphertext output. By the adoption of the method for attacking the elliptical curve encryption algorithm and the attacking device, attacking efficiency is improved.

Description

technical field [0001] The invention relates to information security technology, in particular to a method for attacking an elliptic curve encryption algorithm and an attack device. Background technique [0002] With the development of information technology, the security of information has been raised to an unprecedented height. Various encryption algorithms are being widely used in economic, military, administrative and other important departments to protect the security of information. The emergence of symmetric cryptography and public key cryptography enables information to be protected from the algorithm level and software level. However, after entering the 21st century, with the diversification of attack forms, more and more aggressive methods have also emerged. Especially the side-channel attack and fault injection attack method starting from the hardware makes many security information threatened. The analysis and research on the hardware and software implementati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30
Inventor 雷翻翻何军李大为罗鹏雷银花
Owner DATANG MICROELECTRONICS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products