Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!
A mask protection method and system against arbitrary order side channel attacks
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A side-channel attack and masking technology, applied in the field of arbitrary-order masking schemes and systems, can solve the problem that high-order masking schemes are difficult to apply, high-order masks increase overhead, and first-order masking schemes cannot meet security requirements. And other issues
Active Publication Date: 2019-04-12
WUHAN UNIV
View PDF3 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
However, these countermeasures can only resist the first-order SCA attack. The first-order masking scheme can no longer meet the security requirements, and the higher-order masking scheme is gradually developed.
While pursuing higher security, the high-order masking scheme is also constantly developing towards generalization, mainly in the design of a generalized S-box masking scheme to ensure that it can be applied to any S-box design and can resist any order of SCA attack, but high-order masking will greatly increase additional overhead, so it is difficult to apply high-order masking schemes on resource-constrained devices
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment Construction
[0089] The technical scheme of the present invention is described below in conjunction with accompanying drawing and embodiment
[0090] The embodiments of the present invention reconstruct and generate a lookup table to replace the non-linear components in the original encryption algorithm, thereby realizing encryption.
[0091] The non-linear part S (x) of described encryption algorithm can be defined as
[0092] S:{0,1} k →{0,1} k '
[0093] Among them, the input width is k, the output width is k’, the original input is x, and the original output is y. For the safe masking method, x is required to be split into n independent shared factors, which are recorded as x 1 ,x 2 ,...,x n , and satisfy split y into y 1 ,y 2 ,...,y n , and satisfy
[0094] The refactored lookup table contains two 2 k dimensional column vectors L and R and an n'×2 k The random number matrix M, where Let this list be {L, M, R}. M(u)[j] represents the jth element of the row vector M(u)...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention discloses a mask protection method and system capable of resisting arbitrary-order side channel attacks. A look-up table is generated by reconstruction to replace a nonlinear component; in the look-up table {L, M, R}, elements of a vector L are exclusive-or values of an output of the nonlinear component and n-1 random numbers; the random numbers are stored in a matrix M; a vector R is used for storing an address of a second query; the table satisfies inputting of x<1>, x<2>,..., x<n> and outputting of independent random y<1>, y<2>,..., y<n>, and meanwhile any information of an original input x and an original output y is not leaked; and a table query process comprises the following steps: firstly, generating the look-up table {L, M, R}; then, reconstructing the table through the x<1>, x<2>,..., x<n-1> firstly; performing table refreshing once between every two table reconstructions; and lastly, querying the table {L, M, R} through the x<n> to obtain the y<1>, y<2>,..., y<n>. Through the scheme, the arbitrary-order side channel attacks can be effectively resisted. The method and the system have the characteristics of high security, high practicability and high extensibility.
Description
technical field [0001] The invention relates to the technical field of cryptographic security, in particular to an arbitrary-order masking scheme and system for different software and hardware carriers, which can effectively resist arbitrary-order side channel attacks. Background technique [0002] The carrier form of cryptographic chips or encryption devices has been subjected to various types of analysis and attacks, especially Side Channel Attack (SCA) targeting hardware circuits, which has become the main threat to the hardware form of cryptographic algorithms. The so-called side channel attack refers to the use of various side channels in the circuit working process to leak information, such as: energy consumption, time, faults, electromagnetic radiation, etc. keys) to realize the extraction of secret information. [0003] The mask confrontation scheme is a widely used side channel countermeasure method. Since the mask confrontation scheme was proposed [7], it has grad...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.