Unlock instant, AI-driven research and patent intelligence for your innovation.

A digital signature method, device, mobile device and storage medium

A technology for digital signatures and signed messages, which is applied in the field of information security and can solve problems such as algorithm security attacks and theft of private keys.

Active Publication Date: 2021-02-26
BEIJING YUNCE INFORMATION TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] An embodiment of the present invention provides a digital signature method, which uses random numbers to mask key information used for digital signatures, so as to solve the problem in the prior art by monitoring power consumption curves and using Statistical methods analyze and process the power consumption curve, thereby stealing the private key, leading to the problem that the security of the algorithm is attacked
[0004] The embodiment of the present invention also provides a digital signature device, a mobile device, and a storage medium, which are used to solve the problem that in the prior art, an attacker monitors the power consumption curve and uses statistical methods to analyze and process the power consumption curve according to the characteristics of the curve, thereby stealing private information. key, leading to the problem that the security of the algorithm is attacked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A digital signature method, device, mobile device and storage medium
  • A digital signature method, device, mobile device and storage medium
  • A digital signature method, device, mobile device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] In order to solve the problem in the prior art that the security of the algorithm is attacked because the attacker monitors the power consumption curve, and then uses statistical methods to analyze and process the power consumption curve according to the characteristics of the curve, and finally steals the private key. The embodiment of the invention provides a digital signature method.

[0029] The execution subject of the method may be various types of computing devices, or may be an application program or an application (Application, APP) installed on the computing device. The computing device, for example, may be a user terminal such as a mobile phone, a tablet computer, or a smart wearable device, or may be a server or the like.

[0030] For ease of description, the embodiment of the present invention introduces the method by taking the execution subject of the method as an example of a server cipher machine. Those skilled in the art can understand that the embodi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a digital signature method to solve the problem that in the prior art, an attacker monitors the power consumption curve and uses a statistical method to analyze and process according to the characteristic change rule of the curve, thereby stealing the private key and causing the security of the algorithm to be attacked The problem. The method includes: determining a first parameter for digital signature and a second parameter for randomization processing; performing randomization processing on the private key and the first parameter in turn according to the second parameter, and obtaining randomized private keys respectively and the randomized first parameter; the digital signature result is calculated according to the randomized private key and the randomized first parameter.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a digital signature method. Background technique [0002] In the process of traditional digital signatures, multiple iterative and cyclic operations of block ciphers lead to certain characteristic changes in hardware execution time, power consumption, electromagnetic radiation and other parameters in electronic equipment. Therefore, if an attacker monitors the electronic The execution time curve, power consumption curve, and electromagnetic radiation curve of the device hardware may use statistical methods to analyze and process the power consumption curve according to the characteristics of the above curves, thereby stealing the private key and causing the security of the algorithm to be attacked. Contents of the invention [0003] An embodiment of the present invention provides a digital signature method, which uses random numbers to mask key information used for...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0869H04L9/3247H04L9/3252
Inventor 蒋晓海秦体红
Owner BEIJING YUNCE INFORMATION TECH CO LTD