Unlock instant, AI-driven research and patent intelligence for your innovation.

A side channel attack method and device

A side-channel attack and attacker's technology, applied in the field of information security, can solve problems such as frustration, and achieve the effect of simple attack process

Active Publication Date: 2021-01-19
SHENZHEN INST OF ADVANCED TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If regardless of the private key d B Each bit is 0 or 1, and always perform the same operation that consumes resources, which can effectively thwart SPA

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A side channel attack method and device
  • A side channel attack method and device
  • A side channel attack method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0034] In the side-channel attack method of the embodiment of the present invention, during the decryption process of the public key cryptographic algorithm, a spy process is run to monitor the changes in the cache of the relevant instructions in the public key cryptographic algorithm, to speculate on the execution flow of the public key cryptographic algorithm, and finally obtain the public key cryptographic algorithm. Part or all of the content of the private key in the private key cryptography algorithm. In the following embodiments, the present invention only uses the SM2 algorithm as an ex...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of information security, and particularly relates to a side channel attack method and device. The side channel attack method comprises the steps of a. determining content and a position of a to-be-monitored instruction; b. mapping a process in which a public key password algorithm is to a shared file region of a process in which an attacker is; and c. attacking on a final level of cache of the shared file region so as to obtain a value of a private key dB. Compared with existing power attack or injection attack, the cache attack provided in the invention has a simple process, is fast and accurate, and overcomes the difficulty that an existing attack technology cannot act on a time balance algorithm.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a side channel attack method and device. Background technique [0002] The SM2 algorithm is an elliptic curve public key cryptography algorithm released by the State Cryptography Administration on December 17, 2012. It is designed to replace the RSA algorithm. Compared with the RSA algorithm, the SM2 algorithm has the following advantages: the signature speed and the key pair generation speed are much faster than RSA; the unit security strength of the ECC algorithm (elliptic encryption algorithm) is higher than that of the RSA algorithm, that is, to achieve the same security strength , the key length required by the ECC algorithm is much lower than that of the RSA algorithm; the data shows that the security strength of ECC 256 bits (SM2 is a type of ECC 256 bits) is higher than that of RSA-2048, but the operation speed is faster than that of RSA- 2048 is much faster...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00
CPCH04L9/002
Inventor 唐烨李慧云刘玢玢
Owner SHENZHEN INST OF ADVANCED TECH