Hardware security assessment method for chaotic cryptosystem

A chaotic cryptography and hardware security technology, applied in the field of information security, can solve problems related to cryptographic algorithms, small computational complexity, and less research on side-channel attacks of chaotic cryptography systems

Pending Publication Date: 2019-09-20
GUANGXI NORMAL UNIV
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Compared with traditional methods, it takes less time and has less computational complexity. Classical cryptographic algorithms such as Advanced Encryption Standard (AES for short) and Data Encryption Standard (DES for short) can pass side-channel attacks. The method can be cracked in a relatively short period of time, and many cryptosystems or processors have the risk of bypass information leakage. In 2018, two processor companies, Intel and AMD, were exposed to the fact that many of their processors were bypassed. The risk of hacking
[0004

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware security assessment method for chaotic cryptosystem
  • Hardware security assessment method for chaotic cryptosystem
  • Hardware security assessment method for chaotic cryptosystem

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0061] 1) Analyze the structure of the chaotic block cipher system using the substitution-replacement network structure, and judge the possible bypass information leakage. The work flow of the chaotic block cipher is as follows: figure 1 As shown, each group of plaintext, ciphertext, and key contains 128 bits, and the 128-bit master key is used as the parameter of the tent mapping. The tent mapping is iterated multiple times and mapped to the integer field to generate the round key. In the round key After the addition operation, use the S-box lookup table to perform the replacement operation, and then perform GF(2 8 ) finite field addition, multiplication and cat mapping operations to satisfy the diffusion property, where GF(2 8 ) means 2 8 The finite field of order, and finally repeat these steps M times to ensure security, the specific process is:

[0062] (1) Generate round keys: Assume that the chaotic block cipher process includes M rounds of iterations, and for each it...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a hardware security evaluation method for a chaotic cipher system, which comprises the following steps of 1) analyzing the structure of the chaotic block cipher system applying a replacement-replacement network structure, and judging the possible bypass information leakage; 2) comparing the links with bypass information leakage in the SP structure, and selecting the attack points; 3) modeling the energy consumption information corresponding to the intermediate data generated at the attack point, wherein the adopted energy consumption model is a Hamming weight model; 4) performing the correlation energy analysis attack on the chaotic cryptographic algorithm of the SP structure according to the energy consumption model; and 5) evaluating the security of the chaotic cryptographic algorithm of the SP structure during hardware implementation according to the attack result. According to the method, the hardware security of the chaotic cryptosystem passing the statistical test can be verified, whether the cryptosystem has the possibility of being cracked by a side channel attack or not is verified, and a necessary method and a necessary detection means are provided for the design, analysis and evaluation of the cryptosystem.

Description

technical field [0001] The present invention relates to the technical field of information security, focuses on the hardware security of the chaotic cryptosystem, and explores whether the bypass information leaked by the theoretically verified chaotic cryptosystem during operation can be used by attackers to crack the cryptographic system, specifically a chaotic cryptosystem System hardware security assessment method. Background technique [0002] With the rapid development of information technology, the country, society, and individuals are increasingly connected with information technology, so information security has become particularly important. For the country, information security is related to economic security, social stability, military security, etc. For individuals, information security is related to personal privacy, property safety, personal safety and so on. Therefore, information security has aroused people's widespread attention, and cryptography and crypta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/72G06F21/46G06F21/60H04L9/00H04L9/06
CPCG06F21/72G06F21/602G06F21/46H04L9/001H04L9/0618H04L9/0631H04L9/003
Inventor 罗玉玲刘俊秀张德正
Owner GUANGXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products