Unlock instant, AI-driven research and patent intelligence for your innovation.

Secure implementation method and device for Hash grouping calculation

An implementation method and hash technology, applied in the field of information security, can solve problems such as the threat of hash algorithm

Active Publication Date: 2020-05-12
BEIJING HONGSI ELECTRONICS TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the prior art, the data used in the hash algorithm is all plaintext data. Due to the rise of energy attacks and error attacks, the hash algorithm in the chip is threatened, so it is urgent to provide a secure hash algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure implementation method and device for Hash grouping calculation
  • Secure implementation method and device for Hash grouping calculation
  • Secure implementation method and device for Hash grouping calculation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0126] Embodiment 1 of the present invention provides a secure implementation method for hash group calculation, such as figure 1 shown, including:

[0127] Step S1: The CPU calculates the initial vector in the first buffer area and the data on the upper 8 words in the second buffer area and stores the calculation results in the third buffer area, and calculates the original data in the fourth buffer area and The data on the lower 16 words in the second buffer area is calculated and the calculation result is stored in the fifth buffer area; the data on the lower 16 words in the second buffer area is stored in the sixth buffer area;

[0128] Specifically, step S1 includes: the CPU performs an XOR operation on the initial vector in the first buffer area and the data on the upper 8 words in the second buffer area and stores the calculation result in the third buffer area, The original data in the area and the data on the lower 16 words in the second buffer area are subjected to ...

Embodiment 2

[0172] Embodiment 2 of the present invention provides a secure implementation method for hash group calculation, such as figure 2 and image 3 shown, including:

[0173] Step 101: The CPU obtains the initial vector and saves it in the first buffer area, obtains the original data and saves it in the fourth buffer area; generates a first random number with a preset length and saves it in the second buffer area;

[0174] Specifically, in this embodiment, the length of the initial vector is 8 words, the length of the original data is 16 words, and the length of the first random number is 24 words; each word is 32bit;

[0175] 例如,本实施例中的初始向量为0x6a09e667 0xbb67ae85 0x3c6ef3720xa54ff53a 0x510e527f 0x9b05688c 0x1f83d9ab 0x5be0cd19,原始数据为0XB505CD880X6E54FD04 0X4F7119A8 0X541922FB 0X665B3EDE 0XE7839780 0XE93C869A 0X44BE23060XD98E8B58 0XAFCD7BC8 0XFF9D83DE 0X165CB5A6 0XEC410A1B 0XD33C4EC2 0XBFADD5B30XF6CD5447,生成的第一随机数为0x09b7cbdd 0x5f253cc0 0xdbdae401 0xb8d57bbe0x14e6a026 0x64607bfd 0x6326...

Embodiment 3

[0253] Embodiment 3 of the present invention provides a security implementation device for hash group calculation, such as Figure 4 As shown, the device includes a CPU and a memory, and the memory includes a first buffer area, a second buffer area, a third buffer area, a fourth buffer area, a fifth buffer area, a sixth buffer area, a seventh buffer area, and an eighth buffer area area, the ninth buffer area, the seventeenth buffer area, the eighteenth buffer area, the nineteenth buffer area, and the twenty-seventh buffer area, the CPU includes a first computing module, a second computing module, a third computing module, a Four calculation modules, the first judgment module and the fifth calculation module;

[0254] The first calculation module is used to calculate the initial vector in the first buffer area and the data on the high 8 words in the second buffer area and store the calculation result in the third buffer area, and calculate the data in the fourth buffer area Th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a secure implementation method and device for Hash grouping calculation, and belongs to the field of information security. According to the technical scheme of the invention, mask calculation is carried out on hash grouped data; the hash data is well protected; in the whole hash process, plaintext values do not appear in all the hash data and the intermediate process, powerconsumption analysis such as energy and electromagnetism is well resisted, whether the hash data is attacked by mistake or not is judged after grouping calculation is completed each time, when the mistake attack happens, error reporting is conducted, and the mistake attack can be effectively prevented.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a method and device for realizing security of hash group calculation. Background technique [0002] With the development of electronics and network technology, security chips are becoming more and more important. As an important algorithm of the security chip, the hash algorithm becomes a core of the algorithm especially in the process of calculating the hash operation message authentication code and the asymmetric algorithm. The hash algorithm is to transform the input of any length into a fixed-length output through the hash algorithm. In the prior art, the data used in the hash algorithm is all plaintext data. Due to the rise of energy attacks and error attacks, the hash algorithm in the chip is threatened, so it is urgent to provide a secure hash algorithm. Contents of the invention [0003] The object of the present invention is to provide a method and device ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/71G06F9/30
CPCG06F21/71G06F9/30007G06F9/3012Y02D10/00
Inventor 王亚伟张贺王磊曹军
Owner BEIJING HONGSI ELECTRONICS TECH