Power consumption attack method and system for DES algorithm L register flipping

A power consumption attack and register technology, which is applied in encryption devices with shift registers/memory, transmission systems, digital transmission systems, etc., can solve the problems of low accuracy of DES hardware module security evaluation, low signal-to-noise ratio, and Low-level problems, to improve the accuracy of security evaluation, enhance the effect, and improve the effect of SNR

Active Publication Date: 2019-08-30
CHINA FINANCIAL CERTIFICATION AUTHORITY
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] At present, the DPA attack on the DES algorithm mainly focuses on the first round of DES operation, by randomly inputting plaintext data and then calculating the intermediate value to attack, but the power consumption information P total The proportion is low, resulting in a low signal-to-noise ratio (SNR), and the effect of the DPA attack is weak, which ultimately leads to low accuracy of the security evaluation of the DES hardware module obtained through the existing DPA attack method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power consumption attack method and system for DES algorithm L register flipping
  • Power consumption attack method and system for DES algorithm L register flipping
  • Power consumption attack method and system for DES algorithm L register flipping

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments.

[0044] see figure 1 As shown, the embodiment of the present invention provides a power consumption attack method for DES algorithm L register flipping, including the following steps:

[0045] Use RNG (Random Numeral Generator, Random Number Generator) to generate multiple 32-bit random numbers R, and generate corresponding plaintext according to each random number R. The plaintext satisfies the requirements of the DES algorithm. When the key is fixed, enter the plaintext, the first round The output of an L register is equal to its input. Usually, RNG generates a pseudo-random number or a sequence value calculated by a complex method, so a different seed value is required for each operation. Different seed values ​​result in different sequence values. So it's a true random number

[0046]On the premise of the fixed key of the DES algorithm,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a power consumption attack method and system for DES algorithm L register flipping, and relates to the technical field of DES hardware module safety evaluation, and the methodcomprises the following steps: generating a 32-bit random number R through RNG, and generating a corresponding plaintext; inputting the plaintext into a hardware module with a DES algorithm for operation, collecting power consumption information during operation, generating a power consumption curve, and repeatedly executing the operation until the collected power consumption curve meets the requirement of DPA attack; calculating by utilizing plaintext and guessing keys; selecting an intermediate value corresponding to the plaintext, wherein the intermediate values of the plaintext form an intermediate data array; repeatedly calculating to obtain a plurality of intermediate data arrays corresponding to the plurality of guessing keys; respectively calculating the relevance of the pluralityof intermediate data arrays and power consumption data to find the guessing key corresponding to the intermediate data arrays with the maximum relevance. According to the DES hardware module securityassessment method and device, the SNR can be effectively improved, the DPA attack effect can be enhanced, and the security assessment accuracy of the DES hardware module can be improved.

Description

technical field [0001] The invention relates to the technical field of DES hardware module safety evaluation, in particular to a power consumption attack method and system for DES algorithm L register flipping. Background technique [0002] In 1973, the US National Bureau of Standards publicly solicited cryptographic schemes. After a lot of public discussion, the cryptographic algorithm developed by IBM was adopted as DES (Data Encryption Standard) in 1977 and authorized for use in unclassified government communications. Since its publication, DES has been active on the stage of international secure communication and has become the most commonly used encryption and decryption algorithm in commercial secure communication and computer communication. [0003] The appearance of DES is a major pioneering work in the history of encryption. The details of the previous cipher design were kept strictly confidential, while DES published all the implementation details. DES is a bloc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/00
CPCH04L9/0625H04L9/003H04L2209/12
Inventor 韩绪仓张行王飞宇
Owner CHINA FINANCIAL CERTIFICATION AUTHORITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products