Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A mask operation method and device for SM2 algorithm

A computing method and technology for computing devices, which are applied in computer security devices, computing, protection of internal/peripheral computer components, etc., can solve problems such as security threats to cryptographic chips, and achieve good resistance to power consumption attacks, power consumption analysis, and increased cracking. effect of difficulty

Active Publication Date: 2022-02-18
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The SM2 cryptographic algorithm is theoretically very safe, but in the implementation process, it is necessary to take into account the newly emerging cryptographic analysis methods in recent years. The side-channel attack of the key information poses a serious threat to the security of the cryptographic chip, and the power consumption analysis attack is the most threatening and effective attack method, especially for the implementation of encryption algorithms in hardware encryption devices such as security chips, because Power Consumption Is the Main Bypass Leakage During Cryptographic Device Encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A mask operation method and device for SM2 algorithm
  • A mask operation method and device for SM2 algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0051] It should be noted that when a component is considered to be "connected" to another component, it may be directly connected to the other component or there may be an intervening component at the same time.

[0052] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the technical field of the invention. The terms used herein in the description of the present in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of SM2 encryption algorithm, and in particular relates to a mask operation method and device of SM2 algorithm. The mask operation method is to carry out the random number k in the [k]G operation by means of preset points and random numbers. Covering up, the calculation of [k]G in the SM2 algorithm operation process specifically includes: the preset point P0=[n‑r]G and the first random number r inside the chip; P0 is a point on the finite field elliptic curve, and n is the elliptic curve order, G is the base point on the elliptic curve; generate the second random number d inside the chip, calculate and generate point P1=[d]G; calculate and generate the third random number through the first random number r and the second random number d k=d-r; calculation generation point P2=[k]G=[d-r]G=[d]G-[r]G=[d]G+[n-r]G=P0+P1, the present invention The mask operation device includes a preset module, a random number generation module, a random number operation module, a dot multiplication operation module, and a dot addition operation module; it can enhance the difficulty of deciphering the real parameter information k and power consumption analysis to obtain information, and effectively deal with power consumption analysis attack.

Description

technical field [0001] The invention belongs to the technical field of SM2 encryption algorithm, and in particular relates to a mask operation method and device of the SM2 algorithm with high security, small calculation amount and fast processing speed. Background technique [0002] With the continuous development of cryptography and computing technology, the currently commonly used 1024-bit public key encryption algorithm RSA is facing serious threats. Due to the advantages of SM2 algorithm, such as high security, small amount of calculation, and fast processing speed, our national encryption management department has studied it. It was decided to replace the RSA algorithm with the SM2 elliptic curve cryptographic algorithm. Compared with the RSA algorithm, under the premise of achieving the same security strength, the key length required by the SM2 algorithm is shorter, and the hardware implementation is simpler. [0003] The SM2 cryptographic algorithm is theoretically v...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/75G06F21/60
CPCG06F21/75G06F21/602
Inventor 彭金辉雷宗华习道彬卫志刚刘武忠
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products