Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for correcting intermediate variable calculation result in correlation side channel attack

A side-channel attack and intermediate variable technology, which is applied to the countermeasures of attacking encryption mechanisms, secure communication devices, digital transmission systems, etc., can solve problems such as loss of correlation coefficient attacks

Inactive Publication Date: 2018-03-09
AEROSPACE INFORMATION
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But when the f function is a general function, such as f(x,y)=x+y, at this time due to the simplicity of the operation, the correlation data between the input x and the side channel signal, for the correlation between z and the side channel signal At this time, the generalized correlation coefficient attack cannot use the peak value as the criterion for judging whether the guess is correct, that is, at this time, the correlation coefficient attack loses its effect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for correcting intermediate variable calculation result in correlation side channel attack
  • Method for correcting intermediate variable calculation result in correlation side channel attack
  • Method for correcting intermediate variable calculation result in correlation side channel attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] Exemplary embodiments of the present invention will now be described with reference to the drawings; however, the present invention may be embodied in many different forms and are not limited to the embodiments described herein, which are provided for the purpose of exhaustively and completely disclosing the present invention. invention and fully convey the scope of the invention to those skilled in the art. The terms used in the exemplary embodiments shown in the drawings do not limit the present invention. In the figures, the same units / elements are given the same reference numerals.

[0040] Unless otherwise specified, the terms (including scientific and technical terms) used herein have the commonly understood meanings to those skilled in the art. In addition, it can be understood that terms defined by commonly used dictionaries should be understood to have consistent meanings in the context of their related fields, and should not be understood as idealized or over...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for correcting an intermediate variable calculation result in correlation side channel attack. The method comprises the following steps: forming a function known inputdata array X by at least two known and random ciphertext numerical values input by an external caller; obtaining a sampling time array T according to a side channel signal produced by a sampling function as shown in description; forming a function secret input data space array Y according to possible values of the y, and obtaining the function value space matrix Znxm of the known input data of each element in the array X and the array Y in the operation as shown in description; calculating the correlation coefficient r of each line in the matrix ZnXm and the array T to obtain the array R; calculating the correlation coefficient r- of the array X and the array T; constructing the array X+, enabling the array X+ to satisfy the correlation coefficient with the side channel signal as r-; obtaining the matrix Z+nXm according to a production method of the matrix ZnXm; calculating the correlation coefficient r+ of each line in the matrix Z+nXm and the array T to obtain the array R+; and searching a peak value by calculating the difference of the arrays R and the R+, thereby determining the yj equal to the formula as shown in description.

Description

technical field [0001] The present invention relates to the technical field of encryption and decryption information, and more specifically, relates to a method for correcting calculation results of intermediate variables in correlation side channel attacks. Background technique [0002] During the calculation process, the cryptographic device will release some timing signals in terms of power consumption and electromagnetics. We call these signals side-channel information. Side channel attack is the process of analyzing these side channel information to obtain the internal state of the cryptographic device, and analyze it to obtain the value of the unknown password. Side-channel attacks can be divided into simple side-channel attacks, differential side-channel attacks, template side-channel attacks, and correlation coefficient side-channel attacks according to attack methods. [0003] Correlation coefficient side-channel attacks are mainly based on input data and guessed p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00
CPCH04L9/002
Inventor 华刚
Owner AEROSPACE INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products