A block password fault-tolerant algebraic bypass analysis method based on multi-inference utilization

A block cipher, bypass analysis technology, applied in encryption devices with shift registers/memory, digital transmission systems, electrical components, etc., can solve problems such as attack failures, errors, unsolved equations, etc., to improve fault tolerance. Effect

Inactive Publication Date: 2019-05-21
中国人民解放军32082部队
View PDF2 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In actual attacks, due to the noise of the target cryptographic platform itself, test and measurement technology and instruments, an inference about the encryption intermediate state (such as Hamming heavy information) obtained based on bypass leaks often has certain errors
Since the algebraic bypass attack needs to convert thes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A block password fault-tolerant algebraic bypass analysis method based on multi-inference utilization
  • A block password fault-tolerant algebraic bypass analysis method based on multi-inference utilization
  • A block password fault-tolerant algebraic bypass analysis method based on multi-inference utilization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] Embodiments of the present invention will be described in detail below according to the drawings provided by the present invention.

[0045] The invention discloses a block cipher fault-tolerant algebraic bypass analysis method based on multi-inference utilization. The method constructs an encryption intermediate state based on multiple power consumption traces in the block cipher encryption process performed by a controlled cipher chip when the key is known. The power consumption trajectory template corresponding to the Hamming weight candidate value; use the power consumption trajectory template and a power consumption trajectory in the block cipher encryption process of the cryptographic chip to be attacked to obtain the Hamming multiple inference value set of the encryption intermediate state; The block cipher algorithm and the Hamming multiplicity inference value set are expressed by algebraic equations; the algebraic equations are solved by using a parser to recove...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a block password fault-tolerant algebraic bypass analysis method based on multi-inference utilization, which comprises the following steps of: when a key is known, constructinga power consumption track template corresponding to a Hamming weight candidate value in an encryption intermediate state according to a plurality of power consumption tracks in a block password encryption process executed by a controlled password chip; Executing a power consumption track in a block password encryption process by utilizing the power consumption track template and a password chip tobe attacked to obtain a Hamming weight multi-inference value set in an encryption intermediate state; Representing the block cipher algorithm and the Hamming weight multi-inference value set by usingan algebraic equation; And using an analyzer to solve the algebraic equation, and recovering the encrypted master key. It can be seen that for AES block password implementation on the microcontroller, the master key recovery can be achieved through one power consumption track. Moreover, a plurality of Hamming weight inference values corresponding to one power consumption track exist in the actualattack, so that the fault-tolerant capability of the algebraic bypass attack can be greatly improved by utilizing the plurality of inference values.

Description

technical field [0001] It relates to the field of communication and information security, and in particular relates to a fault-tolerant algebraic bypass analysis technology for keys of block ciphers. Background technique [0002] The design security of the cryptographic algorithm is not equivalent to the security of the cryptographic chip implementation. Due to the physical characteristics of the chip, additional information will be leaked, such as execution time, power consumption, electromagnetic radiation, running Bypass information such as faults can be used to infer the relevant value of the intermediate state (such as Hamming weight), and on this basis, secret information can be extracted at a relatively low cost. This type of attack is called a bypass attack. [0003] In actual attacks, due to the noise of the target cryptographic platform itself, test and measurement technology and instruments, an inference about the encryption intermediate state (such as Hamming hea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04L9/06
Inventor 赵新杰郭世泽张帆朱晖赵茜黄静俞赛赛刘卓然刘文瀚张宇刘磊胡卿
Owner 中国人民解放军32082部队
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products