Unlock instant, AI-driven research and patent intelligence for your innovation.
A method and device for realizing secure rsa operation
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
An implementation method and safe technology, applied in the field of information security, can solve problems such as potential safety hazards, and achieve the effect of protecting normal use and preventing template analysis
Active Publication Date: 2021-04-27
FEITIAN TECHNOLOGIES
View PDF6 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
During the calculation process of RSA on the javacard, it is easy for the attacker to identify the RSA private key by means of template attack and error injection, which poses a security risk.
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0123] Embodiment 1 of the present invention provides a safe RSA operation implementation method, which is suitable for java cards, such as figure 1 As shown, the method of the present embodiment includes:
[0124] Step 101: The device acquires RSA private keys (P, Q, DP, DQ, PQ) and RSA public keys (E, N), and acquires input data (m);
[0125] Preferably, in this embodiment, the obtained RSA private key (P, Q, DP, DQ, PQ) and the RSA public key (E, N) are both RSACRT (the method of using the Chinese remainder theorem to calculate RSA is called RSA CRT ) of the RSA private key and the RSA public key of the RSA CRT;
[0126] In this embodiment, wherein, the RSA private key includes the first data (P) of the RSA private key, the second data (Q) of the RSA private key, the third data (DP) of the RSA private key, the first data (DP) of the RSA private key Four data (DQ), the fifth data (PQ) of the RSA private key, the RSA public key includes the first data (E) of the RSA public ...
Embodiment 2
[0239]Embodiment 2 of the present invention provides a safe RSA operation implementation device, such as Image 6 shown, including:
[0240] The first obtaining module 601 is used to obtain RSA private key, RSA public key and input data;
[0241] In this embodiment, the first acquisition module 601 includes:
[0242] The first obtaining submodule is used to obtain the RSA private key;
[0243] The first judging submodule is used to judge whether all the data of the RSA private key has been obtained, if so, trigger the first generating submodule, otherwise trigger the first acquiring submodule;
[0244] The first generation submodule is used to generate the RSA public key according to the RSA private key;
[0245] Specifically, the first generating submodule is specifically used to use the product of the first data of the RSA private key and the second data of the RSA private key as the first data of the RSA public key, and use the third data of the RSA private key to pair t...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention discloses a method and device for implementing a secure RSA operation. The method includes: performing mask calculation on a third random number according to input data and second data of an RSA public key to obtain a mask result; according to the first random number, the second The random number, the first random prime number, the mask result, the second data of the RSA private key and the RSA public key generate the first intermediate data; generate the fourth random number and the fifth random number that meet the preset conditions, and the second data of the preset length Two random prime numbers; generate second intermediate data according to the second data of the fourth random number, the fifth random number, the third random number, the second random prime number, the RSA private key and the RSA public key; according to the first intermediate data, the second Generate result data from the intermediate data and the second data of the RSA public key; generate third intermediate data according to the result data and the RSA public key; judge whether the third intermediate data is consistent with the input data, if yes, output the result data, otherwise report an error.
Description
technical field [0001] The invention relates to the field of information security, in particular to a method and device for realizing a safe RSA operation. Background technique [0002] The RSA encryptionalgorithm is an asymmetric encryptionalgorithm, which can be used for both encryption and digital signature. The security of RSA is based on the difficulty of large number decomposition, and the RSA public key and RSA private key are functions of a pair of large prime numbers. The difficulty of recovering plaintext from an RSA public key and ciphertext is equivalent to decomposing the product of two large prime numbers. Wherein, the RSA public key of RSA is (e, n), the RSA private key of RSA is (d, n), the encryption formula of RSA is: C=m^e mod n, the decryption formula of standard RSA is: m= C^d mod n, where e is the value of the RSA public key, n is the modulus, d is the value of the RSA private key, C is the ciphertext, and m is the plaintext. During the calculation...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.