A side channel attack method and device
A side-channel attack and attacker's technology, applied in the field of information security, can solve problems such as frustration, and achieve the effect of simple attack process
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0033] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0034] In the side-channel attack method of the embodiment of the present invention, during the decryption process of the public key cryptographic algorithm, a spy process is run to monitor the changes in the cache of the relevant instructions in the public key cryptographic algorithm, to speculate on the execution flow of the public key cryptographic algorithm, and finally obtain the public key cryptographic algorithm. Part or all of the content of the private key in the private key cryptography algorithm. In the following embodiments, the present invention only uses the SM2 algorithm as an ex...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


