Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

SM2 dot multiplication configuration preventing side-channel attack

A channel attack and dot multiplication technology, which is applied in the application field of cryptography technology, can solve problems such as loss of practical significance and successful attack on cryptographic chips, and achieve high scalability

Active Publication Date: 2018-12-07
UNIV OF SCI & TECH OF CHINA
View PDF2 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If there is no good defense against side channel attacks, the designed cryptographic chip may be successfully attacked, which makes the realization of the design lose practical significance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SM2 dot multiplication configuration preventing side-channel attack
  • SM2 dot multiplication configuration preventing side-channel attack
  • SM2 dot multiplication configuration preventing side-channel attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0056] The embodiment of the present invention takes the comprehensive anti-side channel attack of the SM2 algorithm as the starting point, and adopts a set of defense against simple power analysis (Simple Power Analysis, SPA), differential power analysis (Differential Power Analysis, DPA), fault analysis attack (Fault Analysis Attack, FAA) including a series of measures, and algorithm optimization and circuit design for point product calculation fr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an SM2 dot multiplication configuration preventing a side-channel attack. An NAF(k) calculation point multiplication algorithm is modified by adding redundant operation to thealgorithm, so that the algorithm can resist attack of simple power consumption analysis; the coordinate of a basic point is made random, so that different basic-point coordinates are used in calculation to resist attack of differential power consumption analysis; and a point verification module is added to defend a fault analysis attack.

Description

technical field [0001] The invention relates to the application field of cryptography technology, in particular to an SM2 point product structure against side channel attacks. Background technique [0002] The SM2 algorithm is an elliptic curve public key cryptography algorithm with independent intellectual property rights released by the State Cryptography Administration in December 2010. With the continuous development of cryptography and computing technology, the commonly used 1024-bit public key encryption algorithm RSA is facing serious threats. Of course, longer keys such as 2048 bits can be used, but the impact on hardware implementation is the area and power consumption. exponentially increased. Compared with the RSA algorithm, under the premise of achieving the same security strength, the key length required by the SM2 algorithm is shorter, and the hardware implementation is simpler. The short key length brings the advantages of low bandwidth requirement, small st...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/30H04L9/00
CPCH04L9/002H04L9/3066
Inventor 胡红钢刘石刚汪仔业
Owner UNIV OF SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products