Unlock instant, AI-driven research and patent intelligence for your innovation.

Optimization curve alignment method for bypass attacks

A technology for optimizing curves and side-channel attacks, which is applied in the field of information security and can solve problems such as consuming system resources, shortening alignment time, and increasing time for computing dependencies

Active Publication Date: 2018-08-17
SHANGHAI GUANYUAN INFORMATION TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present invention aims at the defect that when the alignment area points gradually increase in the existing alignment technology, the time for calculating the correlation increases gradually, resulting in the consumption of a large amount of system resources, and proposes an optimized curve alignment method for side-channel attacks, which significantly shortens align time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Optimization curve alignment method for bypass attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0016] This embodiment includes the following steps:

[0017] ①Choose the parameter m=50, average the curve, and the curve after pretreatment has power consumption point, the power consumption point value is:

[0018] ② Perform an alignment operation on the new power consumption point: first select a power consumption point in a section of a certain curve (such as the first curve) as a reference power consumption point: (t′ 1,j ) j=a…b , where a is the lower limit of the reference power consumption point, and b is the upper limit; then for all i∈(2…n), translate s points left and right, where s∈(-l…l), s is a positive number When it is a right shift, it is a negative number and it is a left shift, and then calculate (t′ 1,j ) j=a…b and (t' i,j ) j=a…b Correlation c i,k =corr((t' 1,j ) j=a,…,b ,(t′ i,j ) j=a+k,…,b+k ), take c i,k is the maximum auxiliary displacement value s auxi =argmax x c i,s

[0019] ③ use s auxi Displace the ith original curve of :

...

Embodiment 2

[0022] This embodiment includes the following steps:

[0023] ①Choose the parameter m=30, average the curve, and the curve after pretreatment has power consumption point, and choose a discarding parameter th=0.8, the power consumption point value is:

[0024] ② Perform an alignment operation on the new power consumption point: first select a power consumption point in a section of a certain curve (such as the first curve) as a reference power consumption point: (t′ 1,j ) j=a…b , where a is the lower limit of the reference power consumption point, and b is the upper limit; then for all i∈(2…n), translate s points left and right, where s∈(-l…l), s is a positive number When it is a right shift, it is a negative number and it is a left shift, and then calculate (t′ 1,j ) j=a…b and (t' i,j ) j=a…b Correlation c i,s =corr((t' 1,j ) j=a,…,b, (t' i,j ) j=a+s,…,b+s ), take c i,k is the maximum auxiliary displacement value s auxi =argmax x c i,s

[0025] ③ use s auxi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an optimization curve alignment method for bypass attacks. The method comprises the following steps: performing moving window average on every m points on a power consumption curve to obtain an auxiliary curve with a length of (the formula is described in the specification), performing alignment processing on the auxiliary curve to obtain an auxiliary displacement value sauxof each curve, performing displacement with a length of (the formula is described in the specification) on the power consumption curve according to the auxiliary displacement value saux, then performing the alignment processing on the updated power consumption curve again to obtain an optimal displacement value sop, and performing displacement with a length of (the formula is described in the specification) on the power consumption curve according to the optimal displacement value sop to obtain an aligned power consumption curve. By adoption of the optimization curve alignment method providedby the invention, the alignment speed of the curve can be greatly accelerated.

Description

technical field [0001] The present invention relates to a technology in the field of information security, specifically an optimized curve alignment method for side-channel attacks, by quickly and automatically translating each curve, so that the leakage position is consistent and using statistical methods to recover from the power consumption curve Extract the key from the cryptographic device. Background technique [0002] In the implementation environment of the cryptographic system, the attacker can observe and measure information such as energy consumption and electromagnetic radiation of the cipher transformation, and it is possible to use these additional information to achieve more effective cipher deciphering than traditional mathematical analysis, that is, Side Channel Attack (Side Channel Attack). Channel Attack), which includes simple power analysis (SPA) and differential power analysis (DPA), in which DPA attack is to record the power consumption curve of crypto...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00
CPCH04L9/003
Inventor 王伟嘉王凌云陆海宁郭筝刘军荣
Owner SHANGHAI GUANYUAN INFORMATION TECH