Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key recovery device and method for UOV signature

A key recovery and key technology, applied in the field of information security, can solve problems such as low efficiency and hindering the widespread application of UOV signatures

Active Publication Date: 2019-01-04
SHENZHEN POLYTECHNIC
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the existing technology, the key recovery of UOV signature mainly adopts algebraic analysis method, which is inefficient and hinders the wide application of UOV signature to a certain extent.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key recovery device and method for UOV signature
  • Key recovery device and method for UOV signature
  • Key recovery device and method for UOV signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0050] see figure 1 , a schematic structural diagram of an embodiment of a UOV signature key recovery device provided by the present invention, including:

[0051] The message and signature module 1 is used to generate N pairs of message signature pairs based on the UOV signature algorithm; wherein, N is a positive integer greater than 2000;

[0052] The power consumption curve module 2 is used to collect the power consumption curve generated during ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key recovery device for UOV signature. The device comprises a message and signature module, a power consumption curve module, a key operation module, a key guess value module, and a central processing module; the message and signature module is used for generating N message-signature pairs; the power consumption curve module is used for collecting power consumption curvesgenerated during the generation process of each message-signature pair; the key operation module is used for sequentially selecting calculation formulas in which all keys participate during a UOV signature generation process; the key guess value module is used for sequentially selecting elements in GF(2k) as the guess values of the keys in each selected calculation formula; and the central processing module is used for analyzing N power consumption curves when a guess value is selected each time, so as to obtain keys in the UOV signature algorithm. Correspondingly, the present invention alsodiscloses a key recovery method for the UOV signature. With the device and method of the invention adopted, the security problem of the UOV signature can be discovered, so that technical support can be provided for the protection of the UOV.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a UOV signature key recovery device and method. Background technique [0002] UOV signature is a kind of multi-variable signature, which has the ability to resist quantum computer attacks. Its security is based on an NP-Hard problem, that is, solving multivariate quadratic equations in finite fields. [0003] Multivariate structure of UOV signature Contains a central mapping transformation and an affine transformation: y 0 ,y 1 ,...,y m-1 is the message, x 0 , x 1 ,...,x n-1 is the signature, F is the central mapping transformation, L is the affine transformation, and the key is composed of parameters of F and L. inverse transformation of center map Including a multivariate quadratic equation system, is the center mapping transformation result. inverse of affine transformation in the form of A is an n×n matrix, b is a vector of length n, and a and b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0894H04L9/3247
Inventor 易海博
Owner SHENZHEN POLYTECHNIC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products