A Mask Encryption Method for Multivariate Quadratic Equation

A quadratic equation and encryption method technology, applied in the field of information security, can solve problems such as side channel leakage without considering multivariable quadratic equations

Active Publication Date: 2018-11-20
GUANGDONG POLYTECHNIC NORMAL UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, none of the prior art considers the side-channel leakage problem of the multivariable quadratic equation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Mask Encryption Method for Multivariate Quadratic Equation
  • A Mask Encryption Method for Multivariate Quadratic Equation
  • A Mask Encryption Method for Multivariate Quadratic Equation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0059] see figure 1 , is a schematic flow chart of the first embodiment of the mask encryption method for multivariable quadratic equations provided by the present invention, including:

[0060] S11. Randomly generate n masks; n≥1;

[0061] S12. Carry out XOR encryption by one-to-one correspondence between the n masks and the n keys;

[0062] S13. According to the encrypted n keys, the n masks and the plaintext, use a mask algorithm to calculate and obtain the en...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multivariate quadratic equation mask encryption method. The method comprises: randomly generating n masks, wherein n is greater than or equal to 1; performing XOR encryption on the n masks and n keys in a one-to-one correspondence manner; calculating encrypted values of n monomials in an obtained multivariate quadratic equation by use of a masking algorithm according to the encrypted n keys, the n masks and a plaintext; and successively accumulating the encrypted values of the n monomials into a register to obtain a ciphertext. Through adoption of the method, the key security can be effectively improved, and a side channel attack can be defended.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a mask encryption method for multivariable quadratic equations. Background technique [0002] The MQ problem (MQ problem) refers to the problem of solving a set of multivariable quadratic equations on a finite field. Generally speaking, the problem is NP-hard. The MQ problem is a very promising research problem in cryptography. A large number of cryptographic algorithms have been designed based on the MQ problem, including multivariate public key cryptography (MPKC), stream cipher algorithm QUAD, and identity authentication algorithms. Among them, the multivariate quadratic equation can be expressed as follows: [0003] Q(x)=∑ 1≤i≤j≤n alpha ij x i x j +∑ 1≤i≤n beta ij x i +γ [0004] Side channel attack (side channel attack referred to as SCA), also known as side channel attack, is an attack on encryption equipment aimed at side channel information leakage s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/14H04L9/06H04L9/00
CPCH04L9/002H04L9/0656H04L9/14
Inventor 李伟键
Owner GUANGDONG POLYTECHNIC NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products