Method for modular multiplication remainder input side channel attacks aiming at M-ary implementation of RSA

A side-channel and input-side technology, which is applied in the field of modular multiplication and remainder input side-channel energy analysis attacks, can solve problems such as the inability to use SPA analysis, and achieve the effect of improving the attack success rate, increasing the success rate, and improving the attack efficiency

Active Publication Date: 2015-07-29
CHENGDU UNIV OF INFORMATION TECH +3
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, under different exponents (same bits), the M-ary algorithm has a fixed number and position of square operations and multiplication operations in each round, and cannot be analyzed by SPA, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for modular multiplication remainder input side channel attacks aiming at M-ary implementation of RSA
  • Method for modular multiplication remainder input side channel attacks aiming at M-ary implementation of RSA
  • Method for modular multiplication remainder input side channel attacks aiming at M-ary implementation of RSA

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] The specific embodiments of the present invention are described below so that those skilled in the art can understand the present invention, but it should be clear that the present invention is not limited to the scope of the specific embodiments. For those of ordinary skill in the art, as long as various changes Within the spirit and scope of the present invention defined and determined by the appended claims, these changes are obvious, and all inventions and creations using the concept of the present invention are included in the protection list.

[0067] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and simulation examples. The detailed attack flow chart is as follows: Figure 5 .

[0068] Let the base, exponent, and modulus of the remainder of the power be 4 bits, the window width M be 2 bits, and input 9 g...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for modular multiplication remainder input side channel energy analysis attacks aiming at M-ary implementation of an RSA cryptographic algorithm. The core of the method is that when M-ary implementation is used by modular exponentiation, modular multiplication remainder input serves as an attack target to implement CPA (correlation power analysis) attacks. The method comprises the steps that (1) signals are acquired, and a sampling matrix is established; (2) the modular multiplication remainder input is selected to serve as the attack target; (3) a correlation model is determined; (4) cycle index values are guessed, and a median matrix is calculated; (5) a simulated energy consumption matrix is calculated; (6) linear correlation coefficients between corresponding measuring points in the step (1) and the matrix determined in the step (5) are calculated, correct modular multiplication remainder input values of all cycles are attacked, and all corresponding correct cycle indexes are found out, and are connected in series, so that a complete index is obtained. According to the method, a novel M-ary side channel attack method is provided, and the flexibility, the effectiveness and the success rate of RSA cryptographic algorithm analysis attacks are improved.

Description

technical field [0001] The invention relates to the field of analysis and detection of cryptographic algorithms, in particular to a method for analyzing and attacking the energy of a modular multiplication remainder input side channel realized by the RSA cryptographic algorithm M-ary. Background technique [0002] With the development of information and analysis circuit technology, the cracking of hardware cryptographic electronic equipment no longer simply stays on the protocol and algorithm, but starts with the information leaked in the process of processing data. In the process of processing information, hardware cryptographic electronic equipment leaks information such as energy, electromagnetics, errors, and time. Using these leaked information to attack cryptographic electronic equipment is the so-called Side Channel Attacks (Side Channel Attacks). It can be divided into energy analysis attack, electromagnetic attack, error attack, etc. Among them, energy analysis at...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
Inventor 吴震杜之波饶金涛王敏李大为罗鹏赵东艳张海峰唐晓柯胡晓波甘杰刘辉志
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products