Mask operation method and device for SM2 algorithm

A computing method and computing device technology, applied in computer security devices, computing, protection of internal/peripheral computer components, etc., capable of solving problems such as cryptographic chip security threats

Active Publication Date: 2020-12-25
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The SM2 cryptographic algorithm is theoretically very safe, but in the implementation process, it is necessary to take into account the newly emerging cryptographic analysis methods in recent years. The side-channel attack of the key information poses a serious threat to the security of the cryptographic chip, and the power consumption analysis attack is the most threatening and effective attack method, especially for the implementation of encryption algorithms in hardware encryption devices such as security chips, because Power Consumption Is the Main Bypass Leakage During Cryptographic Device Encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mask operation method and device for SM2 algorithm
  • Mask operation method and device for SM2 algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0049] It should be noted that when a component is considered to be "connected" to another component, it may be directly connected to the other component or there may be an intervening component at the same time.

[0050] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the technical field of the invention. The terms used herein in the description of the present in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a mask operation method and device for an SM2 algorithm, the mask operation method masks a random number k in [k] G operation in a mode of presetting a point and a random number, and the [k] G calculation in the SM2 algorithm operation process specifically comprises the following steps: presetting a point P0 = [r1] G and a first random number r in a chip; wherein P0 is a point on a finite field elliptic curve, and G is a base point on the elliptic curve; generating a second random number d in the chip; calculating and generating a third random number k = d.r1 through the first random number r and the second random number d; calculating to generate a point P1 = [k] G = [d * r1] G = [d] * [r1] G = [d] P0, wherein the mask operation device comprises a preset module, arandom number generation module, a random number operation module and a point multiplication operation module; according to the invention, the cracking difficulty of real parameter information k andpower consumption analysis acquisition information can be enhanced, and power consumption analysis attacks can be effectively coped with.

Description

technical field [0001] The invention belongs to the technical field of SM2 encryption algorithm, and in particular relates to a mask operation method and device for the SM2 algorithm. Background technique [0002] With the continuous development of cryptography and computing technology, the currently commonly used 1024-bit public key encryption algorithm RSA is facing serious threats. Due to the advantages of SM2 algorithm, such as high security, small amount of calculation, and fast processing speed, our national encryption management department has studied it. It was decided to replace the RSA algorithm with the SM2 elliptic curve cryptographic algorithm. Compared with the RSA algorithm, under the premise of achieving the same security strength, the key length required by the SM2 algorithm is shorter, and the hardware implementation is simpler. [0003] The SM2 cryptographic algorithm is theoretically very safe, but in the implementation process, it is necessary to take i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/72G06F21/60
CPCG06F21/72G06F21/602
Inventor 彭金辉雷宗华王阳阳刘武忠卫志刚
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products