Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mask operation method and device of SM2 algorithm

A computing method and technology for computing devices, which are applied in computer security devices, computing, protection of internal/peripheral computer components, etc., can solve problems such as security threats to cryptographic chips

Active Publication Date: 2020-12-25
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The SM2 cryptographic algorithm is theoretically very safe, but in the implementation process, it is necessary to take into account the newly emerging cryptographic analysis methods in recent years. The side-channel attack of the key information poses a serious threat to the security of the cryptographic chip, and the power consumption analysis attack is the most threatening and effective attack method, especially for the implementation of encryption algorithms in hardware encryption devices such as security chips, because Power Consumption Is the Main Bypass Leakage During Cryptographic Device Encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mask operation method and device of SM2 algorithm
  • Mask operation method and device of SM2 algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0051] It should be noted that when a component is considered to be "connected" to another component, it may be directly connected to the other component or there may be an intervening component at the same time.

[0052] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the technical field of the invention. The terms used herein in the description of the present in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of SM2 cryptographic algorithms, and particularly relates to a mask operation method and device of an SM2 algorithm, the mask operation method masks a random number k in [k] G operation by presetting a point and a random number, and the [k] G calculation in the SM2 algorithm operation process specifically comprises the following steps: presetting a point P0 = [nr] G and a first random number r in a chip; wherein P0 is a point on a finite field elliptic curve, n is an order of the elliptic curve, and G is a base point on the elliptic curve; a secondrandom number d is generated in the chip, and a generation point P1 = [d] G is calculated; a third random number k = dr is calculated and generated through the first random number r and the second random number d; A point P2 = [k] G = [dr] G = [d] G [r] G = [d] G + [nr] G = P0 + P1 is generated by calculation. The mask operation device comprises a preset module, a random number generation module,a random number operation module, a point multiplication operation module and a point addition operation module; the cracking difficulty of real parameter information k and power consumption analysisacquisition information can be enhanced, and power consumption analysis attacks can be effectively coped with.

Description

technical field [0001] The invention belongs to the technical field of SM2 encryption algorithm, and in particular relates to a mask operation method and device of the SM2 algorithm with high security, small calculation amount and fast processing speed. Background technique [0002] With the continuous development of cryptography and computing technology, the currently commonly used 1024-bit public key encryption algorithm RSA is facing serious threats. Due to the advantages of SM2 algorithm, such as high security, small amount of calculation, and fast processing speed, our national encryption management department has studied it. It was decided to replace the RSA algorithm with the SM2 elliptic curve cryptographic algorithm. Compared with the RSA algorithm, under the premise of achieving the same security strength, the key length required by the SM2 algorithm is shorter, and the hardware implementation is simpler. [0003] The SM2 cryptographic algorithm is theoretically v...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/75G06F21/60
CPCG06F21/75G06F21/602
Inventor 彭金辉雷宗华习道彬卫志刚刘武忠
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products