Bypass defense method, device, electronic equipment and readable medium based on sike algorithm

An algorithm and bypass technology, applied in the direction of secure communication devices, electrical components, public keys for secure communications, etc.

Active Publication Date: 2021-11-23
ZHEJIANG UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The purpose of the embodiments of the present invention is to provide a bypass defense method, device, electronic equipment and readable medium based on the SIKE algorithm, so as to solve the existing SIKE algorithm in the process of implementing the hardware platform. There may be various bypass information leakage problems, so as to ensure the information security when using the SIKE algorithm for information encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bypass defense method, device, electronic equipment and readable medium based on sike algorithm
  • Bypass defense method, device, electronic equipment and readable medium based on sike algorithm
  • Bypass defense method, device, electronic equipment and readable medium based on sike algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be clearly and completely described below in conjunction with specific embodiments of the present application and accompanying drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0048] figure 1 A flow chart of a bypass defense method based on the SIKE algorithm provided by the embodiment of the present invention; a bypass defense method based on the SIKE algorithm provided by the present embodiment, the method includes the following steps:

[0049] Step S101, using the SIKE algorithm as the key encapsulation algorithm in the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a bypass defense method, device, electronic equipment and readable medium based on the SIKE algorithm, including: the SIKE algorithm is used as the key encapsulation algorithm in the session key negotiation stage before the hardware platform performs secure communication; In the process of encrypting the session key, the homology relationship φ needs to be calculated. When calculating the homology relationship φ, the calculation of the kernel (kernel) will perform the operation ker(φ)= <p+dq>, where P and Q are points on the elliptic curve agreed in advance, d is the private key, and P+dQ is the addition operation of points on the elliptic curve; after the calculation of the homology relationship φ is completed, the session key negotiation phase is completed. The present invention is to ker(φ)= <p+dq>The calculation of has been improved, and the improved method conceals the SIKE algorithm in the execution of ker(φ)= <p+dq>Bypass leaks in the process. Common side-channel attack methods have good defense effects.< / p+dq>

Description

technical field [0001] The invention relates to the fields of cryptography bypass energy analysis and the like, in particular to a bypass defense method, device, electronic equipment and readable medium based on the SIKE algorithm. Background technique [0002] Since the Diffie-Hellman (DH) key exchange mechanism was proposed in 1976, the public key cryptosystem has developed rapidly, and public key cryptographic algorithms such as RSA and ECC have been widely used. However, in recent years, with the development of quantum computing technology and the in-depth application of quantum algorithms, people have found that the mathematical problems based on public key cryptography, such as large number decomposition problems, discrete logarithm problems, etc., will be cracked by quantum algorithms within a limited time . When quantum computers are actually implemented, such algorithms will become easy to break and thus become less secure. Therefore, it is very urgent to study cr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/30H04L9/00
CPCH04L9/002H04L9/0825H04L9/0838H04L9/3066
Inventor 张帆杨博麟
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products