Check patentability & draft patents in minutes with Patsnap Eureka AI!

Side channel energy analysis method and device for HMAC (Hash-based Message Authentication Code)-SM3 cryptographic algorithm

A cryptographic algorithm and energy analysis technology, applied in the field of data analysis, can solve problems such as low success rate and difficulty in cracking

Active Publication Date: 2016-11-23
SHANGHAI FUDAN MICROELECTRONICS GROUP +1
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because the Hamming distance model is more suitable for the cryptographic module of the HMAC-SM3 cryptographic algorithm implemented in hardware, but for the cryptographic module implemented in software, if the Hamming distance model is used to crack the key, it is difficult to crack, and the success rate is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Side channel energy analysis method and device for HMAC (Hash-based Message Authentication Code)-SM3 cryptographic algorithm
  • Side channel energy analysis method and device for HMAC (Hash-based Message Authentication Code)-SM3 cryptographic algorithm
  • Side channel energy analysis method and device for HMAC (Hash-based Message Authentication Code)-SM3 cryptographic algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0078] At present, when obtaining the first key data of the cryptographic module, because there is an energy leak in the bit conversion between the known state value and the unknown state value of a certain register of the cryptographic module, the Hamming distance model can be used to The cryptographic module is analyzed to obtain the first key data of the cryptographic module. However, the above method is more suitable for cryptographic modules implemented in hardware, and it is difficult to crack cryptographic modules implemented in software.

[0079] In view of the above problems, an embodiment of the present invention provides a side channel energy analysis method of the HMAC-SM3 encryption algorithm. The method inputs a message group to a cryptographic module based on the HMAC-SM3 cryptographic algorithm, collects energy consumption information generated by the message group on the one hand, and establishes a corresponding energy consumption matrix; The variable is used...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a side channel energy analysis method and a device for a HMAC (Hash-based Message Authentication Code)-SM3 cryptographic algorithm. The method comprises steps: the value of first key data Kin is analyzed and acquired; the value of second key data Kout is analyzed and acquired; and according to the acquired value of the first key data Kin and the value of the second key data Kout, a message digest is generated. The step of analyzing and acquiring the value of the first key data Kin comprises sub steps: a message group M is inputted to a cryptographic module; energy consumption information generated during the process of processing each inputted message by the cryptographic module is acquired; when j=1, (A1 xor B1) and (E1 xor F1) are firstly selected as analysis objects, and values of variables B1 and F1 are acquired respectively; (A1 xor B1 xor C1) and (E1 xor F1 xor G1) are then selected as analysis objects, and values of variables C1 and G1 are acquired respectively. When the method of the invention is used for acquiring the first key data, the decryption success rate can be effectively improved.

Description

technical field [0001] The invention relates to the technical field of data analysis, in particular to a side channel energy analysis method and device of an HMAC-SM3 cryptographic algorithm. Background technique [0002] Cryptographic hash algorithms are widely used in digital signature and verification, message authentication code generation and verification, and random number generation, etc., which meet the security requirements of various cryptographic applications. Among them, the SM3 cryptographic algorithm is the earliest cryptographic hash algorithm published in my country, and it is widely used. [0003] Hash-based Message Authentication code (HMAC) based on cryptographic hash algorithm uses cryptographic hash algorithm, takes a key and message as input, and outputs a message digest with authentication information. The receiver of the message digest can verify the identity of the sender of the message digest and the validity of the message according to the authent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06
Inventor 王立辉郭丽敏张志敏李大为罗鹏莫凡
Owner SHANGHAI FUDAN MICROELECTRONICS GROUP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More