Side channel attack preventing algorithm applicable to full life cycle of system data

A full life cycle, channel attack technology, applied in the field of anti-side channel attack algorithm, can solve security threats, no common algorithm model for anti-side channel and other problems, and achieve the effect of easy implementation

Inactive Publication Date: 2018-09-11
林喆昊 +1
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

From the perspective of side-channel attacks, these new devices and applications firstly provide them with extremely rich target settings, which pose a huge threat and challenge to their security; , the academic community has not proposed a general anti-side-channel algorithm model for the entire life cycle of encryption algorithms, which means that at present, there is an urgent need for an efficient anti-side-channel general algorithm suitable for high-security devices
[0007] To sum up, there is a need for an anti-side-channel attack algorithm that can effectively guarantee the security of system data under side-channel attacks, protect data security, and ensure system security and is applicable to the entire life cycle of system data. No report

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Side channel attack preventing algorithm applicable to full life cycle of system data
  • Side channel attack preventing algorithm applicable to full life cycle of system data
  • Side channel attack preventing algorithm applicable to full life cycle of system data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The specific embodiments provided by the present invention will be described in detail below in conjunction with the accompanying drawings.

[0051] Please refer to figure 1 , figure 1 It is a schematic diagram of the SCA attack process framework. It is aimed at all links in any system that may encounter side-channel attacks during the entire life cycle of operation and the corresponding three main side-channel attack methods. This scheme is designed to defend against the currently known mainstream and highly harmful side-channel attack methods, but not to defend against all side-channel attack methods.

[0052] Therefore, through the defense framework of this solution, the whole life cycle of the system can be defended and protected, and the more harmful part and the key operation data part can be effectively protected, so that the data can be accessed from system login, data operation, and data transmission. It has security guarantees in the field of side channel a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a side channel attack preventing algorithm applicable to the full life cycle of system data. The algorithm comprises the steps of S1, locally performing a timing sequence attack applied to password login authentication; S2, locally performing a common computation; S3, locally performing an encryption operation; and S4, executing a defense strategy when the information datais transmitting. The algorithm has the advantages that the full life cycle system running side channel attack defense frame is built for the side channel attack that may be suffered during the full running life cycle of the system data, so that the data and system security can be ensured during the whole running cycle of the system, the data is prevented from being leaked, and thus the information security is ensured.

Description

technical field [0001] The invention relates to the technical field of computer network communication, in particular to an anti-side channel attack algorithm applicable to the whole life cycle of system data. Background technique [0002] In recent years, typical cases of side channels that have great influence in the field of computer network communication and international academic circles have emerged in an endless stream. They use different forms of side channel information to analyze the vulnerable points of the target, so as to achieve the goal of confidentiality and encryption. The purpose of obtaining and cracking. Reports on the research and technical methods of side-channel attack defense at home and abroad are also emerging. The main defense methods include: software and hardware masking technology in implementation, dynamic dual-rail circuit technology, clock scrambling technology, etc. [0003] As a cryptanalysis technique for cryptographic devices, side-channe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00
CPCH04L9/002H04L9/005
Inventor 李朋林林喆昊
Owner 林喆昊
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products