Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for detecting capability of RIPEMD-160 algorithm in defending differential fault attacks

A RIPEMD-160, differential fault attack technology, which is applied in the countermeasures of attacking encryption mechanisms, digital transmission systems, electrical components, etc., can solve problems such as hidden dangers of cryptographic equipment security, and achieve the effect of easy implementation and simple and accurate method.

Inactive Publication Date: 2017-02-15
DONGHUA UNIV
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In terms of evaluating the ability of the RIPEMD-160 algorithm to resist differential fault attacks, there is currently no public analysis method, which brings hidden dangers to the security of cryptographic devices encapsulated with the RIPEMD-160 hash algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting capability of RIPEMD-160 algorithm in defending differential fault attacks
  • Method for detecting capability of RIPEMD-160 algorithm in defending differential fault attacks
  • Method for detecting capability of RIPEMD-160 algorithm in defending differential fault attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the present invention more clear, the preferred embodiments are listed, and the detailed illustrations are as follows.

[0041] When using the RIPEMD-160 algorithm to process the same plaintext message X with the same key, if the experimental environment (such as clock, voltage, humidity, radiation, pressure, light and eddy current, etc.) is different, the attacker can obtain the correct output respectively Y and the error output Y*, by calculating the output difference value of these two values, that is Indicates the XOR operation, and the key information can be deduced. Attackers can induce faults to occur while the processing device is running the RIPEMD-160 algorithm, but they do not know the specific location of the fault and the specific error value. Under some specific conditions, the position of fault introduction can be deduced from the difference ΔY, and the fault introduced at this time is called an effective fault. On the contrary, when ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for detecting a capability of an RIPEMD-160 algorithm in defending differential fault attacks. First of all, a certain input message is processed by use of RIPEMD-160; in a message processing phase, two kinds of control are implemented on an execution environment, i.e., on one hand, the processing process needs to run accurately under control and an output result is recorded as Y; and on the other hand, on condition that it is ensured that the processing messages are the same, faults are manually introduced in a processing process, a wrong output result is induced to be generated and is recorded as Y*. Through calculating a differential value between Y and Y*, the capability of the RIPEMD-160 in defending the differential fault attacks is evaluated, if it is detected that the faults take place, positions of the faults can be derived, and validity of the fault positions can be further determined. The method provided by the invention has the advantages of simplicity, rapidness, accuracy, easy realization and the like, and provides a good analysis basis for detecting the capability of the RIPEMD-160 in defending the differential fault attacks.

Description

technical field [0001] The invention relates to a method for detecting the RIPEMD-160 hash cipher algorithm against differential fault attacks, which is used to evaluate the algorithm's ability to resist differential fault attacks, and is mainly used in testing the security of products packaged with the algorithm. Background technique [0002] With the advent of the era of big data, various information is stored in network servers, how to prevent attackers from actively attacking and ensure the integrity of these information has become the core issue to ensure data security. The RIPEMD-160 algorithm is a hash cipher proposed by European researchers. It is anti-first preimage, anti-second preimage and non-collision, and is the basic component of information integrity protection. [0003] Differential fault attack is a cryptographic attack technique that combines fault attack and differential analysis. It focuses on the structure of the cryptographic algorithm and the charact...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00H04L12/24
CPCH04L9/004H04L41/145H04L2209/26
Inventor 李玮廖林峰周志洪葛晨雨高志勇石秀金夏小玲曹奇英
Owner DONGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products