Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Energy Analysis and Detection Method for SM2 Decryption Algorithm

A technology of decryption algorithm and detection method, which is applied in the field of energy analysis and detection for SM2 decryption algorithm, can solve the problems of large number of energy curves and low detection efficiency, and achieve the effects of liberating labor and energy, improving efficiency, and improving the level of automation

Active Publication Date: 2020-07-14
CHENGDU UNIV OF INFORMATION TECH +1
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In view of the above-mentioned deficiencies in the prior art, the energy analysis detection method for the SM2 decryption algorithm provided by the present invention solves the problem that the number of energy curves required for detection is large and the detection efficiency is low when detecting and analyzing the SM2 encryption algorithm in the security chip password detection. question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Energy Analysis and Detection Method for SM2 Decryption Algorithm
  • Energy Analysis and Detection Method for SM2 Decryption Algorithm
  • Energy Analysis and Detection Method for SM2 Decryption Algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The following describes the specific embodiments of the present invention to facilitate those skilled in the art to understand the present invention, but it should be clear that the present invention is not limited to the scope of the specific embodiments, for those of ordinary skill in the art, as long as various changes These changes are obvious within the spirit and scope of the present invention defined and determined by the appended claims, and all inventions and creations using the concept of the present invention are protected.

[0032] Such as figure 2 As shown, the energy analysis detection method S for SM2 decryption algorithm provided by this solution includes steps S1 to S3.

[0033] In step S1, input the test data M, C and the SM2 decryption device d , And collect the energy curve of SM2 operation, where M is the plaintext and C is the private key d The ciphertext generated by the corresponding public key encryption.

[0034] The energy curve T is based on the sa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an energy analysis and detection method for an SM2 decryption algorithm, including S1, inputting test data M, C and d , and collect the energy curve during SM2 operation, where M is the plaintext, and C is the d The ciphertext generated by the corresponding public key encryption; S2. Simultaneously scan the doubling point curve segment and the point plus curve segment in the multi-point operation on the energy curve to obtain the analysis result d' ; S3, judging the analysis result d' and private key d Whether the binary representation of is the same except for the lowest bit, if so, the SM2 decryption algorithm design is not safe, otherwise the SM2 decryption algorithm design is safe. Compared with the existing technology, this solution requires fewer energy curves, and does not need to manually perform attack detection bit by bit during the detection process. At the same time, it liberates the labor and energy of the detection personnel, improves the automation level of detection and analysis, and improves the efficiency of detection and analysis. , simplicity, flexibility, effectiveness, and correctness.

Description

Technical field [0001] The invention relates to the field of cryptographic algorithm realization analysis and detection, in particular to an energy analysis and detection method aimed at SM2 decryption algorithm. Background technique [0002] The realization of cryptographic algorithms is realized by microcontroller instructions. The microcontroller has a set of instructions, which generally include arithmetic instructions, logic instructions, data transfer instructions, and transfer instructions. Each instruction acts on several bytes and involves different components of the microcontroller, such as arithmetic logic unit, memory, or some peripheral devices (such as communication ports). These microcontroller components are physically separated, and their functions and implementations are different. Therefore, they have different energy consumption characteristics, which will produce different characteristic patterns in the energy trace. For example, data transfer instructions ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00
CPCH04L9/003H04L2209/26
Inventor 杜之波吴震王敏向春玲
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products