Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security evaluation method and device of elliptic curve algorithm

An elliptic curve algorithm and security technology, applied in the field of cryptography, can solve the problems of elliptic curve algorithm cracking, rarely consider the safety performance of multi-point calculation, hidden safety hazards, etc., and achieve the effect of reducing security vulnerabilities

Inactive Publication Date: 2017-10-10
北京智慧云测科技有限公司 +1
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But few consider the safety performance of multipoint operation
If there is a loophole in the multi-point calculation part, the elliptic curve algorithm will be cracked, which will pose a great security risk
[0005] Therefore, before the elliptic curve cryptography product leaves the factory, it is necessary to evaluate the security performance of its key operations. However, the security evaluation of the multi-point algorithm is rarely involved in the prior art. loophole

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security evaluation method and device of elliptic curve algorithm
  • Security evaluation method and device of elliptic curve algorithm
  • Security evaluation method and device of elliptic curve algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In order to make the purposes, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention. Obviously, the described embodiments are only These are some embodiments of the present invention, but not all embodiments. The components of the embodiments of the invention generally described and illustrated in the drawings herein may be arranged and designed in a variety of different configurations. Thus, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the invention as claimed, but is merely representative of selected embodiments of the invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security evaluation method and device of an elliptic curve algorithm. The method comprises the steps that an energy consumption curve of a chip based on the elliptic curve algorithm in performing a point multiplication operation is determined, wherein the energy consumption curve characterizes the relationship between energy and time consumed by the chip; based on a pre-established energy consumption characteristic database, a first energy consumption sub-curve corresponding to the point multiplication operation and a second energy consumption sub-curve corresponding to a point addition operation are located from the energy consumption curve; based on the energy consumption curve, the type of the point multiplication operation is determined; the security of the elliptic curve algorithm is evaluated according to the types of the point multiplication operation, the first energy consumption sub-curve and the second energy consumption sub-curve. The security evaluation method and device of the elliptic curve algorithm can evaluate the security of the point multiplication operation of the elliptic curve algorithm before the elliptic curve cipher products leave the factory, and the situation that the elliptic curve cipher products have security loopholes after leaving the factory is avoided.

Description

technical field [0001] The present invention relates to the technical field of cryptography, in particular, to a security evaluation method and device for an elliptic curve algorithm. Background technique [0002] With the gradual improvement of people's requirements for information security, the encryption system has been fully developed. Generally, cryptosystems are divided into symmetric cryptosystems (private key cryptosystems) and asymmetric cryptosystems (public key cryptosystems). Asymmetric cryptosystems use different keys for encryption and decoding. [0003] Elliptic Curve Cryptography (ECC) is an asymmetric cryptosystem. ECC has the characteristics of short key length, fast encryption and decryption speed, low requirements for computing environment, and low requirements for bandwidth when communication is required. Therefore, in recent years, ECC is widely used in commercial cryptography. State Secret SM2 is also an asymmetric encryption system, which is an asym...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/30
CPCH04L9/3066H04L9/3252
Inventor 史汝辉李增局张策李文宝李海滨石新凌陈百顺吴祥富王洋
Owner 北京智慧云测科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products