Decryption method for TTS signature

An algorithm and calculation formula technology, applied in the field of information security, can solve the problem that the decryption method is not particularly effective

Inactive Publication Date: 2016-04-27
易海博
View PDF2 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] For the decryption of multi-variable public key cryptography, especially for the decryption of TTS signatures, the existing technology generally uses algebraic attack methods, but with the continuous improvement of algorithms, the use of these decryption methods is not particularly effective

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Decryption method for TTS signature
  • Decryption method for TTS signature
  • Decryption method for TTS signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0035] See figure 1 , A schematic flow chart of an embodiment of a method for decrypting a TTS signature provided by the present invention includes:

[0036] S1. Obtain the calculation formula in the TTS signature algorithm;

[0037] S2. Select the values ​​in the set in turn as the private key sample values ​​in the calculation formula, and each time a private key sample value is selected, sequentially select the values ​​in the set as the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a decryption method for a TTS signature, comprising steps of obtaining a calculation formula in the TTS signature algorithm, successively choosing numerical values in a set as private key sampling values in the calculation formula, successively choosing the numerical value from the set as an input value of the calculation formula to perform operation when each private key sampling value is chosen so as to obtain the power consumption curve generated during the operation process, wherein the set is ((00...0)2, (00...1)2, ...,(11...1)2), and adopting a differential energy attack method based on a Hamming distance model to perform analysis on the power consumption curve to obtain the private key in the TTS signature algorithm. The embodiment of the invention can improve the decryption efficiency of the TTS signature.

Description

Technical field [0001] The present invention relates to the technical field of information security, in particular to a method for decrypting TTS signatures. Background technique [0002] Multivariate public key cryptography is one of the most important public key cryptography now and in the future. It has the ability to resist quantum computer attacks. Its security is based on an NP-Hard problem, that is, solving a finite field of multivariate multi-dimensional equations, most of which are quadratic polynomials. TTS signature is a representative password of multivariable public key cryptography. [0003] For the decryption of multivariable public key passwords, especially the decryption of TTS signatures, the prior art generally uses algebraic attack methods, but with the continuous improvement of algorithms, the use of these decryption methods is not particularly effective. Summary of the invention [0004] The embodiment of the present invention provides a TTS signature decrypt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L63/06H04L9/0861H04L63/1441
Inventor 易海博李伟键
Owner 易海博
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products