Unlock instant, AI-driven research and patent intelligence for your innovation.

Apparatus and method for randomizing key bit variables of public key encryption algorithm

An encryption algorithm and public key technology, applied in the public key of secure communication, countermeasures against encryption mechanism, secure communication devices, etc., to achieve the effect of improving security

Pending Publication Date: 2020-10-02
KOOKMIN UNIV IND ACAD COOP FOUND
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] So far, even if the corresponding technology proposed for designing RSA and ECC encryption algorithms for security analysis in the side channel is applied, there is a loophole that the n-bit secret key bits can be easily recovered by calculating the waveform of the encryption algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Apparatus and method for randomizing key bit variables of public key encryption algorithm
  • Apparatus and method for randomizing key bit variables of public key encryption algorithm
  • Apparatus and method for randomizing key bit variables of public key encryption algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] Hereinafter, a detailed description of preferred embodiments of the device and method for randomizing key bit variables of a public key encryption algorithm according to the present invention is as follows.

[0051] The features and advantages of the device and method for randomizing the key bit variables of the public key encryption algorithm according to the present invention will be clarified through the detailed description of each embodiment below.

[0052] Figure 8 is a structural diagram of a device for randomizing key bit variables of a public key encryption algorithm according to the present invention, Figure 9 is a flowchart illustrating a method for randomizing key bit variables of a public key encryption algorithm according to the present invention.

[0053] According to the device and method for randomizing the key bit variable of the public key encryption algorithm of the present invention, when embodying the encryption algorithm hardware, it is confirm...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to an apparatus and a method for randomizing key bit variables of a public key encryption algorithm, the apparatus and the method performing initialization with a randomvalue each time before the start of a repetitive operation for confirming a secret key bit value, and masking an n-bit secret key with an n-bit random value, thereby resolving the vulnerability of thepublic key encryption algorithm. The apparatus comprises: an information confirmation unit for confirming information on a chip in which the encryption algorithm operates; an encryption algorithm determination unit for determining a method implementing the encryption algorithm; a hardware correspondence processing unit for initializing the secret key bit value with the random value each time before the start of the repetitive operation for confirming the secret key bit value when the encryption algorithm is implemented in hardware; and a software correspondence processing unit for masking thesecret key bit value with the random value in a step before starting the repetitive operation for confirming the secret key bit value when the encryption algorithm is implemented in software.

Description

technical field [0001] The present invention relates to side channel analysis correspondence, in particular to initializing with random values ​​each time and masking the n-bit secret key with n-bit random values ​​before starting the iterative calculation of the bit values ​​of the secret key , so as to solve the loopholes of the public key encryption algorithm and the device and method for randomizing the key bit variables of the public key encryption algorithm. Background technique [0002] RSA, the core algorithm of the recognized certification system of online banking, online securities trading, etc., which is usually used in many electronic transactions, and the elliptic curve cryptography (elliptic curve cryptography ( ECC (Elliptic Curve Cryptography) algorithm is weak to side channel analysis attacks. [0003] Side-channel analysis is a physical attack that exploits side-channel information that occurs during the execution of a cryptographic algorithm on a security...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30
CPCH04L9/003H04L2209/08H04L2209/04H04L9/3066H04L2209/12
Inventor 沈辅妍韩东国
Owner KOOKMIN UNIV IND ACAD COOP FOUND