Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A side channel attack method for the realization of rsa encryption algorithm m-ary

A cryptographic algorithm and side-channel technology, applied in the field of side-channel energy analysis attacks, can solve problems such as inability to use SPA, and achieve the effects of reducing interference, improving success rate, and improving attack efficiency

Active Publication Date: 2018-05-25
CHENGDU UNIV OF INFORMATION TECH +3
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, under different exponents (same bit), the M-ary algorithm has a fixed number and position of square operations and multiplication operations in each round, and cannot be analyzed by SPA, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A side channel attack method for the realization of rsa encryption algorithm m-ary
  • A side channel attack method for the realization of rsa encryption algorithm m-ary
  • A side channel attack method for the realization of rsa encryption algorithm m-ary

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] The specific embodiments of the present invention are described below so that those skilled in the art can understand the present invention, but it should be clear that the present invention is not limited to the scope of the specific embodiments. For those of ordinary skill in the art, as long as various changes Within the spirit and scope of the present invention defined and determined by the appended claims, these changes are obvious, and all inventions and creations using the concept of the present invention are included in the protection list.

[0067] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and simulation examples.

[0068] Let the base, exponent, and modulus of the remainder of the power be 4 bits, the window width M be 2 bits, and input 9 groups of test cases, use the same exponent, modulus, and di...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a side channel energy analysis attack method for the multiplication output when the power residue calculation M-ary is realized in the RSA cryptographic algorithm. CPA attack. It includes the following steps: (1) collect signals and establish a sampling matrix; (2) select the multiplication output as the attack object; (3) determine the correlation model; (4) guess the round index value and calculate the intermediate value matrix; (5) calculate Simulate the energy consumption matrix; (6) Calculate the linear correlation coefficient between the matrices determined in (1) and (5), and attack the correct round index. (7) Repeat (4) to (6), the attack gets all the correct round indices, and the complete indices are obtained after concatenation. The method of the invention provides a new M-ary side channel attack method, which enhances the flexibility, effectiveness and success rate of RSA cryptographic algorithm analysis attacks.

Description

technical field [0001] The invention relates to the field of analysis and detection of cryptographic algorithms, in particular to a method for analyzing side channel energy analysis attacks aimed at the multiplication output when the power residue calculation M-ary in the RSA cryptographic algorithm is realized. Background technique [0002] With the development of information and analysis circuit technology, the cracking of hardware cryptographic electronic equipment no longer simply stays on the protocol and algorithm, but starts from the information leaked in the process of processing data to crack. In the process of processing information, hardware cryptographic electronic equipment leaks information such as energy, electromagnetics, errors, and time. Using these leaked information to attack cryptographic electronic equipment is the so-called Side Channel Attacks. It can be divided into energy analysis attack, electromagnetic attack, error attack, etc. Among them, energy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06
Inventor 吴震杜之波饶金涛王敏李大为罗鹏郑晓光刘剑峰
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products