Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security analysis method and system for encryption equipment with mask combination circuit

An encryption device and security analysis technology, applied in computer security devices, electrical digital data processing, internal/peripheral computer component protection, etc., can solve problems such as low precision, variance, and the effectiveness of the rollover counting model

Active Publication Date: 2019-07-16
CHINA ACADEMY OF INFORMATION & COMM
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the current problem that the accuracy of the simulation is low due to the difference between the reverse annotation information obtained by the simulation and the real delay in the actual circuit, which seriously affects the validity of the flip counting model, the present invention provides a method for Security analysis method, system, electronic equipment and storage medium of circuit encryption equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security analysis method and system for encryption equipment with mask combination circuit
  • Security analysis method and system for encryption equipment with mask combination circuit
  • Security analysis method and system for encryption equipment with mask combination circuit

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0059] In the current flip counting model, due to the difference between the reverse annotation information obtained by simulation and the real delay in the actual circuit, the accuracy of the simulation is low, which seriously affects the validity of the flip counting model.

[0060] In view of this, the present invention provides a security analysis method, system, electronic equipment and storage medium for an encryption device with a mask combination circui...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security analysis method and system for encryption equipment with a mask combination circuit. A cross-correlation analysis result between an overturning counting model and anactual measurement power consumption curve of encryption equipment is calculated; an optimized flip count model is determined, and finally, the safety performance of the encryption equipment is testedby utilizing the optimized flip counting model, so that the influence caused by the difference between the reverse annotation information obtained by simulation and the real delay in the actual circuit is eliminated, the simulation precision is improved, and the effectiveness of the flip counting model applied to the safety analysis of the encryption equipment is further improved. Meanwhile, theoptimization scheme only needs to combine with an actual measurement power consumption curve to correct the delay information in the standard delay format file so as to achieve the purpose of model optimization, and the method is simple and efficient.

Description

technical field [0001] The present application relates to the field of security analysis of encryption equipment, and more specifically, relates to a security analysis method, system, electronic equipment and storage medium for encryption equipment with mask combination circuits. Background technique [0002] Side-channel analysis is one of the most threatening analysis methods in the field of cryptanalysis, and masking is an anti-side-channel protection scheme at the algorithm level. By randomizing the intermediate value, the physical power consumption is blocked from the actual Correlation of intermediate values ​​in cryptographic algorithms. However, even if a masking scheme is provably secure, there will still be security flaws in the implementation. [0003] Existing analysis methods for masked combinational circuits are mainly divided into two categories. The first type of method analyzes the glitches generated in the circuit to obtain leaked information. The glitch i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/72
CPCG06F21/602G06F21/72
Inventor 李煜光魏凡星路晔绵詹鹏翼潘娟国炜
Owner CHINA ACADEMY OF INFORMATION & COMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products