Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Power consumption attack method based on convolutional neural network and selection message method

A convolutional neural network and power attack technology, applied in neural learning methods, biological neural network models, neural architectures, etc., can solve problems such as power consumption curve observation, reduce attack accuracy, implement simplicity, and reduce attacks The effect of complexity

Pending Publication Date: 2020-12-01
TIANJIN UNIV
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, after a series of blinding, coupled with interference such as noise, random delay, and random clock glitches in the actual hardware environment, it is difficult to directly observe the characteristics of the power consumption curve through SPA
So far, many machine learning methods have been applied to RSA, but they all need to go through various complicated preprocessing and denoising

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power consumption attack method based on convolutional neural network and selection message method
  • Power consumption attack method based on convolutional neural network and selection message method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The power consumption attack method based on the convolutional neural network and the selected message method of the present invention will be described in detail below with reference to the embodiments and the accompanying drawings.

[0025] Such as figure 1 As shown, the power consumption attack method based on the convolutional neural network and the selected message method of the present invention includes the following steps:

[0026] 1) Build a data set based on the public key encryption algorithm (RSA), including a training set and a test set; including:

[0027] Select the message number 1 as the encrypted input message, and input it into the encryption program blinded Boscher modular exponentiation algorithm in the field programmable array FPGA; execute the encrypted program blinded Boscher modular exponentiation algorithm on the field programmable array FPGA, and collect the voltage function during execution Consumption data, that is, to obtain the voltage a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a power consumption attack method based on a convolutional neural network and a selection message method, and the method comprises the steps: constructing a data set based on apublic key encryption algorithm, wherein the data set comprises a training set and a test set; constructing a power consumption analysis model based on a convolutional neural network method; traininga power consumption analysis model based on a convolutional neural network method; and testing by using the trained power consumption analysis model based on the convolutional neural network method.The RSA encryption scheme based on the blind Boscher modular exponentiation algorithm is realized, and the attack efficiency is far higher than that of other existing schemes on the basis of simple realization. The method provided by the invention is not only suitable for RSA encryption systems based on a blind Boscher modular exponentiation algorithm, but also suitable for most RSA encryption systems based on modular multiplication modular square loop iteration at present.

Description

technical field [0001] The invention relates to a power consumption attack method. In particular, it involves a power consumption attack method based on convolutional neural network and chosen message method. Background technique [0002] With the development of economic globalization and informatization, information transmission is applied to various fields such as finance, commerce, and military affairs. The leakage of sensitive information will not only cause huge losses to personal and corporate property, but even threaten national security in severe cases. , which poses a challenge to the construction of information security and confidentiality. [0003] The current side-channel attacks are mainly divided into two categories, one is vertical side-channel attacks, and the other is horizontal side-channel attacks. Vertical side-channel attacks mainly use statistical tools to measure a large number of power consumption curve samples and extract data features. In order t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55H04L9/00H04L9/30G06N3/04G06N3/08G06K9/62
CPCG06F21/556H04L9/003H04L9/302G06N3/08G06N3/048G06N3/045G06F18/24
Inventor 郭炜陆瑾魏继增
Owner TIANJIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products