Supercharge Your Innovation With Domain-Expert AI Agents!

SM2 signature used large-number modular exponentiation inversion power dissipation measurement method and system thereof

A detection method and technology of power consumption, applied in the field of computer security, can solve problems such as narrow applicability

Active Publication Date: 2017-01-04
SHANGHAI JIAO TONG UNIV
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the analysis object of this technology lies in the generation process of the fourth value, and its applicability is narrow. When the protective measures are applied, the fourth value may have changed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SM2 signature used large-number modular exponentiation inversion power dissipation measurement method and system thereof
  • SM2 signature used large-number modular exponentiation inversion power dissipation measurement method and system thereof
  • SM2 signature used large-number modular exponentiation inversion power dissipation measurement method and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] Such as figure 2 As shown, this embodiment includes the following steps:

[0028] Step 1. Randomly input the key, execute the SM2 signature cyclically and locate the large number inversion stage, use the modular exponentiation algorithm to collect the power consumption curve, and calculate the intermediate value information of the modular square operation.

[0029] The intermediate value information of the modular square operation refers to: the single-byte Hamming weight of all intermediate results in the first modular square of the modular exponentiation algorithm.

[0030] Since the first modular squaring operation always has a direct relationship with the key, restoring the value can directly restore the key, so the intermediate value in the first modular squaring operation is selected.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an SM2 signature used large-number modular exponentiation inversion power dissipation measurement method and a system thereof. The system comprises a key detection module, an information classification module, a template processing module, a matching calculation module and an off-line key recovery module, wherein the key detection module conducts SM2 signature and obtains Hamming weight information of key intermediate values, then outputs the Hamming weight information to the information classification module; the information classification module classifies power curves according to the Hamming weight information of the intermediate values, and outputs the classification information to the template processing module; and the template processing module conducts modeling according to the classification information and inputs template information to the matching calculation module, the matching calculation module matches the template information with a to-be-detected SM2 signature and outputs the matching result to the off-line key recovery module, and the off-line key recovery module conducts off-line calculation and obtains the key information of the to-be-detected SM2 signature. The SM2 signature used large-number modular exponentiation inversion power dissipation measurement method and the system thereof are reasonable in design, power dissipation curve detection is conducted aiming at the inversion vulnerability of the SM2 signature, and a new direction for the protection of the SM2 signature is provided.

Description

technical field [0001] The invention relates to a technology in the field of computer security, in particular to a large number modular power inversion power consumption detection method and a system thereof for SM2 signatures. Background technique [0002] In reality, cryptographic systems are usually implemented with hardware or software in the form of hardware, such as smart cards, RFID, cryptographic coprocessors, SoC cryptographic chips, and cryptographic machines. In the implementation environment of these cryptographic systems, attackers can observe and measure information such as energy consumption and electromagnetic radiation of cryptographic transformations. Using these additional information may achieve more effective cryptographic deciphering than traditional mathematical analysis. Attacks in this environment are often referred to as "side channel attacks" (SideChannel Attack). Side-channel attacks typically include Simple Power Analysis (SPA) and Differential ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00
CPCH04L9/003
Inventor 许森谷大武陆海宁
Owner SHANGHAI JIAO TONG UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More