An SM2 elliptic curve signature verification hardware system and method resistant to differential power consumption attack

A differential power attack, elliptic curve technology, applied in the protection of internal/peripheral computer components, instruments, electrical digital data processing, etc. problem, to achieve the effect of good resistance to differential power attack, simple and easy method, and ensure security.

Inactive Publication Date: 2019-01-15
GUANGDONG UNIV OF TECH
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] However, none of the above three defense measures can effectively hide the real key and power c

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An SM2 elliptic curve signature verification hardware system and method resistant to differential power consumption attack
  • An SM2 elliptic curve signature verification hardware system and method resistant to differential power consumption attack
  • An SM2 elliptic curve signature verification hardware system and method resistant to differential power consumption attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The present invention will be further described below in conjunction with specific embodiment:

[0061] See attached figure 1 As shown, the SM2 elliptic curve signature verification hardware system described in this embodiment that is resistant to differential power consumption attacks includes an SM2 main control module 1, a signature generation module 2, a signature verification module 3, a random number generator 4, and a module Operation module 5, password hash module 6, point multiplication operation module 7 and point addition operation module 8; described signature generation module 2 and signature verification module 3 are all connected with SM2 main control module 1, and random number generator 4, modulus operation The module 5 , the cryptographic hash module 6 , the dot product operation module 7 and the dot addition operation module 8 are all connected to the signature generation module 2 and the signature verification module 3 .

[0062] Such as Figure 6 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an SM2 elliptic curve signature verification hardware system and method for resisting differential power consumption attack, the anti-differential power consumption attack method of the invention is applied to scalar multiplication, by adding the improved randomized scalar method to the point multiplication operation, the correlation between the real key information and the power curve is destroyed, which makes it difficult for the power analysis to obtain the information to resist the power analysis, and ensures the security of the differential power attack, thus playing a very good role in resisting the differential power attack. And this method is simple and easy to implement, and can be integrated into a variety of encryption chips and other hardware devices.

Description

technical field [0001] The invention relates to the technical field of SM2 cryptographic algorithm, in particular to an SM2 elliptic curve signature verification hardware system and method against differential power consumption attack. Background technique [0002] Information security is an important issue related to national sovereignty and security, social stability and national cultural heritage. Among them, encryption technology is the core technology to ensure information security, and it is an indispensable technology to ensure information integrity, confidentiality and security. [0003] With the development of cryptography and computing technology, the currently commonly used 1024-bit RSA algorithm is facing serious security threats. Due to the advantages of the SM2 algorithm, such as high security, small amount of calculation, and fast processing speed, our national password management department decided to use it after research. The SM2 elliptic curve cryptograph...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/64G06F21/72
CPCG06F21/602G06F21/64G06F21/72
Inventor 陆江城张盛仕胡湘宏熊晓明
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products