SM2 signature method for resisting attacks by using co-processor
A co-processor and anti-attack technology, applied in the field of information security, can solve the problems of vulnerability to side channel attacks such as DPA and leakage of sensitive data, and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0039] The first embodiment of the present invention provides an SM2 signature method that uses a coprocessor to resist attacks, including the following steps:
[0040] Step S1: The CPU generates a preprocessing result according to the basic user information obtained from reading the memory and the information to be signed obtained from reading the memory;
[0041] Further, in step S1 in this embodiment, the CPU generates a preprocessing result according to the basic user information obtained from reading the memory and the information to be signed obtained from reading the memory, specifically: the CPU generates a preprocessing result according to the basic user information obtained from reading the memory and The information to be signed obtained by reading the memory is spliced to generate a preprocessing result.
[0042] Step S2: The CPU controls the coprocessor to generate a first random result according to the base point of the elliptic curve and the third random number gener...
Embodiment 2
[0073] The second embodiment of the present invention provides an SM2 signature method that uses a coprocessor to resist attacks, such as figure 1 As shown, including the following steps:
[0074] Step 201: The CPU performs a splicing operation based on the user's basic information obtained from reading the memory and the information to be signed obtained from reading the memory to generate the data to be hashed, and store the generated data to be hashed in the memory. The data is hashed to obtain the signature hash value, and the signature hash value is stored in the memory;
[0075] Specifically, in this embodiment, before step 201, the method further includes: hashing to obtain the user's basic information according to the user's identifiable identifier, the first constant, and the user's public key, and storing the user's basic information in the memory; Identification ID: Information that can identify the user's identity without ambiguity. The first constant is a part of the e...
Embodiment 3
[0193] The third embodiment of the present invention provides an SM2 signature device that uses a coprocessor to resist attacks, such as figure 2 As shown, it includes: a CPU, a coprocessor 306, a memory 307, and a random number generator 308;
[0194] The CPU includes a reading module 301, a control module 302, a generation module 303, a first judgment module 304, and an output module 305;
[0195] The memory 307 is used to store basic user information and information to be signed;
[0196] The reading module 301 is configured to read the memory 307 to obtain basic user information and information to be signed;
[0197] The generating module 303 is configured to generate a pre-processing result according to the basic user information obtained by the reading module 301 reading the memory 307 and the information to be signed obtained by the reading module 301 reading the memory 307;
[0198] Further, the generation module 303 in this embodiment is specifically configured to perform a s...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

