Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for realizing secure rsa operation

An implementation method and safe technology, applied in the field of information security, can solve problems such as potential safety hazards, and achieve the effect of protecting normal use and preventing template analysis

Active Publication Date: 2021-04-27
FEITIAN TECHNOLOGIES
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

During the calculation process of RSA on the javacard, it is easy for the attacker to identify the RSA private key by means of template attack and error injection, which poses a security risk.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for realizing secure rsa operation
  • A method and device for realizing secure rsa operation
  • A method and device for realizing secure rsa operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0123] Embodiment 1 of the present invention provides a safe RSA operation implementation method, which is suitable for java cards, such as figure 1 As shown, the method of the present embodiment includes:

[0124] Step 101: The device acquires RSA private keys (P, Q, DP, DQ, PQ) and RSA public keys (E, N), and acquires input data (m);

[0125] Preferably, in this embodiment, the obtained RSA private key (P, Q, DP, DQ, PQ) and the RSA public key (E, N) are both RSACRT (the method of using the Chinese remainder theorem to calculate RSA is called RSA CRT ) of the RSA private key and the RSA public key of the RSA CRT;

[0126] In this embodiment, wherein, the RSA private key includes the first data (P) of the RSA private key, the second data (Q) of the RSA private key, the third data (DP) of the RSA private key, the first data (DP) of the RSA private key Four data (DQ), the fifth data (PQ) of the RSA private key, the RSA public key includes the first data (E) of the RSA public ...

Embodiment 2

[0239]Embodiment 2 of the present invention provides a safe RSA operation implementation device, such as Image 6 shown, including:

[0240] The first obtaining module 601 is used to obtain RSA private key, RSA public key and input data;

[0241] In this embodiment, the first acquisition module 601 includes:

[0242] The first obtaining submodule is used to obtain the RSA private key;

[0243] The first judging submodule is used to judge whether all the data of the RSA private key has been obtained, if so, trigger the first generating submodule, otherwise trigger the first acquiring submodule;

[0244] The first generation submodule is used to generate the RSA public key according to the RSA private key;

[0245] Specifically, the first generating submodule is specifically used to use the product of the first data of the RSA private key and the second data of the RSA private key as the first data of the RSA public key, and use the third data of the RSA private key to pair t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for implementing a secure RSA operation. The method includes: performing mask calculation on a third random number according to input data and second data of an RSA public key to obtain a mask result; according to the first random number, the second The random number, the first random prime number, the mask result, the second data of the RSA private key and the RSA public key generate the first intermediate data; generate the fourth random number and the fifth random number that meet the preset conditions, and the second data of the preset length Two random prime numbers; generate second intermediate data according to the second data of the fourth random number, the fifth random number, the third random number, the second random prime number, the RSA private key and the RSA public key; according to the first intermediate data, the second Generate result data from the intermediate data and the second data of the RSA public key; generate third intermediate data according to the result data and the RSA public key; judge whether the third intermediate data is consistent with the input data, if yes, output the result data, otherwise report an error.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method and device for realizing a safe RSA operation. Background technique [0002] The RSA encryption algorithm is an asymmetric encryption algorithm, which can be used for both encryption and digital signature. The security of RSA is based on the difficulty of large number decomposition, and the RSA public key and RSA private key are functions of a pair of large prime numbers. The difficulty of recovering plaintext from an RSA public key and ciphertext is equivalent to decomposing the product of two large prime numbers. Wherein, the RSA public key of RSA is (e, n), the RSA private key of RSA is (d, n), the encryption formula of RSA is: C=m^e mod n, the decryption formula of standard RSA is: m= C^d mod n, where e is the value of the RSA public key, n is the modulus, d is the value of the RSA private key, C is the ciphertext, and m is the plaintext. During the calculation...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/30
CPCH04L9/0869H04L9/302
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES