Implementation method for efficiently resisting differential power analysis of RSA

A technology of differential power consumption analysis and implementation method, which is applied to the public key of secure communication, digital transmission system, electrical components, etc. It can solve the problems of time-consuming, complex implementation method of modular inverse operation, large amount of calculation, etc., and achieve acceleration RSA implementation, reducing implementation area and space, avoiding the effect of modulo inverse operation

Inactive Publication Date: 2018-06-15
SHANGHAI HUAHONG INTEGRATED CIRCUIT +1
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The traditional scheme uses random numbers to blind the input data, making it impossible for attackers to perform differential power analysis on RSA
However, this solution requires a very large amount of calculation, especially in the process of unblinding, which requires modular inverse operations.
However, the implementation methods of modular inverse operations are usually very complicated and time-consuming, so this method cannot be implemented in a resource-constrained environment.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The invention provides an RSA implementation method based on high-efficiency anti-differential power consumption analysis, and the implementation method can be used for direct RSA operation and RSA CRT operation. The implementation example process of the RSA CRT implementation method is described as follows:

[0025] Step 1. In the RSACRT operation, M is the input data, C is the output data, N is the modulus, R is the random number, e is the public key, and d is the

[0026] For the private key, p and q are large prime numbers, and N=p*q.

[0027] Step 2, get 64-bit non-zero random number R

[0028] Step 3, calculate the blinded input data M 1 ,M 1 =M*R e mod N.

[0029] Step 4, calculate the data M for unblinding operation 2 ,M 2 =M*R e-1 mod N

[0030] Step 5, calculate the index value, dp=(d-1)mod(p-1)

[0031] dq=(d-1)mod(q-1)

[0032] Step 6, calculate M p , M q ,M p = M 1 mod p

[0033] m q= m 1 mod q

[0034] Step 7, calculate S p , S q , S ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an implementation method for efficiently resisting differential power analysis of RSA and provides an implementation instance of an RSA CRT implementation method adopting the method. According to the scheme, complex modular inversion in a traditional blind scheme is avoided, and the modular inversion is replaced by modular multiplication which is easy to achieve, the RSA operation efficiency can be greatly improved on the premise that the safety is not influenced, and the time and the space for RSA implementation are saved.

Description

technical field [0001] The present invention relates to information encryption, in particular to an RSA implementation method that requires anti-differential power analysis (DPA). Background technique [0002] In recent years, side-channel attacks on cryptographic algorithms have attracted more and more attention and research. Side Channel Attacks (SCA) use the non-intentional information leaked when the algorithm is running in the circuit to analyze the secret data in the algorithm circuit. Power consumption analysis is currently the most popular and widely researched type of side-channel attack. Attacks are carried out by monitoring physical information such as current and voltage leaked by encryption systems. According to the attack methods, power analysis can be mainly divided into two types: Simple Power Analysis (SPA) and Differential Power Analysis (DPA), which are aimed at different weaknesses of the circuit. Simple power analysis attacks by observing the power con...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/00
CPCH04L9/003H04L9/302
Inventor 蒋艳柴佳晶吕瑞恩
Owner SHANGHAI HUAHONG INTEGRATED CIRCUIT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products