Unlock instant, AI-driven research and patent intelligence for your innovation.

Verifying method of countermeasure against power side-channel attack

A technology of side-channel attack and verification method, which is applied in the field of cryptographic algorithm program randomization and camouflage proof, which can solve the problems of insufficient performance, incompleteness, inability to quickly prove and detect the actual cryptographic algorithm program, etc., and achieve the effect of performance improvement

Active Publication Date: 2018-11-13
SHANGHAI TECH UNIV
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The proof method based on type deduction has the advantages of speed and reasonable results, but it is not complete, so there will be many false positives
The method based on model counting and solving has the characteristics of reasonable and complete results, and there is no possibility of false positives, but there is a problem of insufficient performance, and it is impossible to quickly prove and test the actual cryptographic algorithm program

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verifying method of countermeasure against power side-channel attack
  • Verifying method of countermeasure against power side-channel attack
  • Verifying method of countermeasure against power side-channel attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the present invention more comprehensible, preferred embodiments are described in detail below with accompanying drawings.

[0022] According to the technical solution of the present invention, the implementation focuses on the type of the input program, the design of the type derivation system, the selection of the model count solver and the formula coding of the model count solver. Taking the linear Boolean program as an example, the present invention is further described in detail, and the specific implementation technical scheme is as follows: figure 2 shown.

[0023] The type deduction rules characterize the type of the expression calculation result according to the operator type and operand type in the expression. There are mainly five types of probability distributions in the type derivation system: 1) uniform distribution (RUD), 2) independent distribution (SID); 3) non-independent distribution (NMP), 4) unknown distribution (UKD) and 5) const...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a verifying method of a countermeasure against a power side-channel attack. The verifying method of the countermeasure against the power side-channel attack is characterized by comprising the following steps: using the compiler technology to translate a cryptographic algorithm program into intermediate representation, and labeling the secret part, public part and random variable in the cryptographic algorithm program; and step 2, using the type inference to infer each intermediate result in the intermediate representation according to the intermediate result dependencyrelation of the program. The invention achieves remarkable performance improvement effect. Through the experiments of a plurality of encryption algorithm programs, it takes only a few seconds to complete the proof of a perfect randomized camouflage MACKeccak program; and for an imperfect randomized camouflage program, the method disclosed by the invention can detect and locate all leaking points,and the performance of the invention is improved by one time compared with the traditional SMT-based method.

Description

technical field [0001] The invention relates to a randomized masquerading proof method and a leakage detection method of a cryptographic algorithm program. Background technique [0002] Cryptographic algorithms (Cryptographic algorithms), as the basis of security mechanisms, have been widely used in embedded devices, smart cards, Internet of Things and other systems to protect data security. The security of cryptographic algorithms is usually based on the fact that attackers can only access the input and output of the system, but cannot obtain the key in the encryption algorithm. But in real life, the attacker can use the physical information of the system to crack the key, such as the time, power consumption, electromagnetic radiation and other information when the cryptographic algorithm program is running. Such attacks are called side-channel attacks (Side-channel attacks), which exploit the statistical dependence between these physical information and the encryption key...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/20
CPCH04L9/003H04L9/0656
Inventor 宋富
Owner SHANGHAI TECH UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More