Bypass distinguisher method and system based on class separability criteria

A bypass and criterion technology, applied in the field of computer security, can solve the problem of single use of information in the DPA discrimination method, and achieve the effect of improving analysis efficiency and large separability.

Active Publication Date: 2016-11-23
SHANGHAI GUANYUAN INFORMATION TECH
View PDF7 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Aiming at the defects and deficiencies of the prior art, the present invention proposes a bypass distinguisher method and system based on class-separable distance judgment, which is applicable to all application scenarios of the DPA method, and is more versatile than the DPA method, and solves the problem of Typical DPA discriminant method information utilization single problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bypass distinguisher method and system based on class separability criteria
  • Bypass distinguisher method and system based on class separability criteria
  • Bypass distinguisher method and system based on class separability criteria

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] This embodiment relates to a bit-based general differential power consumption analysis method, which is described by taking AES hardware implementation as an example: for hardware-implemented AES, the analysis can be expressed as a function: I=f(k,m). Due to the existence of key confusion, the intermediate value in the register of each round is related to the current 8-bit round key, and its 16-byte S boxes are executed in parallel and overlapped on the power consumption curve. This invisibly reduces the signal-to-noise ratio and increases the number of curves required for the attack. To carry out ordinary DPA attacks, a large number of power consumption curves must be collected at the same time, occupying a large storage space and computing power.

[0027] This embodiment includes the following steps:

[0028] ①Randomly input the plaintext m, execute the target function f cyclically, and collect the power consumption curve, such as figure 2 shown;

[0029] ②Accordin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a bypass distinguisher method and system based on class separability criteria. The method includes the steps that after plaintext is input for hardware to be measured, an objective function is cyclically executed, and a power consumption curve generated in the execution process is collected; the intermediate value of each conjecture subkey is calculated; after the intermediate values are classified according to different classification structures, the divergence matrix criterion in each class is analyzed to obtain a corresponding statistical magnitude curve, and combination processing is carried out on obtained classification results to obtain comprehensive statistical magnitude curves of the conjecture subkeys; finally, the conjecture subkey corresponding to the comprehensive statistical magnitude curve with the highest peak value is a candidate key. The bypass distinguisher method and system based on class separability criteria are suitable for all application scenes of the DPA method, have higher universality than the DPA method and solve the problem of singular information utilization of the DPA distinguishing method; meanwhile, multi-point information utilization in DPA can be achieved, and analysis efficiency can be improved.

Description

technical field [0001] The present invention relates to a technology in the field of computer security, in particular to a bypass distinguisher method and system based on class separability judgment distance. Background technique [0002] In reality, cryptographic systems are usually implemented with hardware or software in the form of hardware, such as: smart cards, RFID, cryptographic coprocessors, SoC cryptographic chips, cryptographic machines, etc. In the implementation environment of these cryptographic systems, attackers can observe and measure information such as energy consumption and electromagnetic radiation of cryptographic transformations, and it is possible to use these additional information to achieve more effective cryptographic deciphering than traditional mathematical analysis. People usually refer to the attack in this environment as "Side Channel Attack (SideChannel Attack)". Side-channel attacks typically include Simple Power Analysis (SPA) and Differe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55
CPCG06F21/556
Inventor 许森陆海宁刘军荣郭筝王伟嘉
Owner SHANGHAI GUANYUAN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products