Unlock instant, AI-driven research and patent intelligence for your innovation.
Optimization curve alignment method for bypass attacks
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology for optimizing curves and side-channel attacks, which is applied in the field of information security and can solve problems such as consuming system resources, shortening alignment time, and increasing time for computing dependencies
Active Publication Date: 2018-08-17
SHANGHAI GUANYUAN INFORMATION TECH
View PDF3 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0003] The present invention aims at the defect that when the alignment area points gradually increase in the existing alignment technology, the time for calculating the correlation increases gradually, resulting in the consumption of a large amount of system resources, and proposes an optimized curve alignment method for side-channel attacks, which significantly shortens align time
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0016] This embodiment includes the following steps:
[0017] ①Choose the parameter m=50, average the curve, and the curve after pretreatment has power consumption point, the power consumption point value is:
[0018] ② Perform an alignment operation on the new power consumption point: first select a power consumption point in a section of a certain curve (such as the first curve) as a reference power consumption point: (t′ 1,j ) j=a…b , where a is the lower limit of the reference power consumption point, and b is the upper limit; then for all i∈(2…n), translate s points left and right, where s∈(-l…l), s is a positive number When it is a right shift, it is a negative number and it is a left shift, and then calculate (t′ 1,j ) j=a…b and (t' i,j ) j=a…b Correlation c i,k =corr((t' 1,j ) j=a,…,b ,(t′ i,j ) j=a+k,…,b+k ), take c i,k is the maximum auxiliary displacement value s auxi =argmax x c i,s
[0019] ③ use s auxi Displace the ith original curve of :
...
Embodiment 2
[0022] This embodiment includes the following steps:
[0023] ①Choose the parameter m=30, average the curve, and the curve after pretreatment has power consumption point, and choose a discarding parameter th=0.8, the power consumption point value is:
[0024] ② Perform an alignment operation on the new power consumption point: first select a power consumption point in a section of a certain curve (such as the first curve) as a reference power consumption point: (t′ 1,j ) j=a…b , where a is the lower limit of the reference power consumption point, and b is the upper limit; then for all i∈(2…n), translate s points left and right, where s∈(-l…l), s is a positive number When it is a right shift, it is a negative number and it is a left shift, and then calculate (t′ 1,j ) j=a…b and (t' i,j ) j=a…b Correlation c i,s =corr((t' 1,j ) j=a,…,b, (t' i,j ) j=a+s,…,b+s ), take c i,k is the maximum auxiliary displacement value s auxi =argmax x c i,s
[0025] ③ use s auxi...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention provides an optimization curve alignment method for bypass attacks. The method comprises the following steps: performing moving window average on every m points on a power consumption curve to obtain an auxiliary curve with a length of (the formula is described in the specification), performing alignment processing on the auxiliary curve to obtain an auxiliary displacement value sauxof each curve, performing displacement with a length of (the formula is described in the specification) on the power consumption curve according to the auxiliary displacement value saux, then performing the alignment processing on the updated power consumption curve again to obtain an optimal displacement value sop, and performing displacement with a length of (the formula is described in the specification) on the power consumption curve according to the optimal displacement value sop to obtain an aligned power consumption curve. By adoption of the optimization curve alignment method providedby the invention, the alignment speed of the curve can be greatly accelerated.
Description
technical field [0001] The present invention relates to a technology in the field of information security, specifically an optimized curve alignment method for side-channel attacks, by quickly and automatically translating each curve, so that the leakage position is consistent and using statistical methods to recover from the power consumption curve Extract the key from the cryptographic device. Background technique [0002] In the implementation environment of the cryptographic system, the attacker can observe and measure information such as energy consumption and electromagnetic radiation of the cipher transformation, and it is possible to use these additional information to achieve more effective cipher deciphering than traditional mathematical analysis, that is, Side Channel Attack (Side Channel Attack). Channel Attack), which includes simple power analysis (SPA) and differential power analysis (DPA), in which DPA attack is to record the power consumption curve of crypto...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.