Supercharge Your Innovation With Domain-Expert AI Agents!

A method and a device for constructing an overturning counting model

A model and hierarchical model technology, applied in the field of information security, can solve problems such as inability to obtain intermediate values, characterization of combined circuit power consumption leakage, etc., to achieve the effect of strong pertinence and high efficiency

Pending Publication Date: 2019-05-10
CHINA ACADEMY OF INFORMATION & COMM
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Its disadvantage is that when using the Hamming heavy model, it is considered that the power consumption generated by the encryption equipment is related to the Hamming heavy weight of the data processed
[0006] The disadvantage is that when the attacker knows the original design or a part of the continuously processed data in the netlist, the Hamming distance model can be used to describe the power consumption leakage information of this part
There are a large number of glitches in the combinational circuit, even if the attacker obtains the netlist file in advance, it is often impossible to obtain the correct intermediate value, so the Hamming distance model is not suitable for describing the power leakage on the combinational circuit

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and a device for constructing an overturning counting model
  • A method and a device for constructing an overturning counting model
  • A method and a device for constructing an overturning counting model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0033] With the rapid development of information technology, the role of information security has become more and more important. One of the core technologies in the existing information security field is cryptography. From the various protocols of the computer network application layer to the various hardware devices in the communication system, cryptography plays a very important role. Existing encryption algorithms are mainly divided into two categories: s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a device for constructing an overturning counting model. The method comprises the following steps: carrying out simulation hierarchical model classification on a logic simulation tool for analyzing power consumption leakage in encryption equipment; dividing the simulation hierarchical model into a burr-free model and a burr-containing model; determining that thesimulation hierarchical model is a burr-free model, and obtaining a final simulation hierarchical model according to the simulation hierarchical model corresponding to the circuit type of the encryption equipment; Exporting the simulation data in the final simulation hierarchical model as a VCD file; and analyzing the overturning signal in the VCD file to obtain an overturning counting model. According to the method and the device for constructing the flip counting model provided by the invention, the burr information is depicted through the model hierarchy required by simulation, and the flip counting leakage model is constructed in combination with the type of the circuit of the actual encryption equipment, so that the pertinence is stronger and the efficiency is higher when the actualside channel power consumption analysis is implemented.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method and device for constructing a rollover counting model. Background technique [0002] With the rapid development of information technology, the role of information security has become more and more important. However, no matter the hardware implementation or software implementation of the encryption algorithm, it will be threatened by various security threats. Among them, side channel analysis is one of the important means to threaten the security of encryption equipment. [0003] In order to improve the efficiency of side information analysis, scholars have proposed various leakage models, such as: the prior art scheme 1: the Hamming heavy model, which is suitable for describing the bus power consumption or the power consumption when the initial state of the encryption device is constant. When the attacker cannot obtain the complete netlist file or cannot judge the d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F17/50G06F21/55
Inventor 李煜光魏凡星路晔绵詹鹏翼潘娟国炜
Owner CHINA ACADEMY OF INFORMATION & COMM
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More