Comprehensive protection method for resisting side channel and fault attacks

A fault attack, channel technology, applied in the countermeasures of attack encryption mechanism, secure communication device, encryption device with shift register/memory, etc. Achieve the effect of perfect protection and flexible protection scheme

Inactive Publication Date: 2021-01-05
INST OF SOFTWARE - CHINESE ACAD OF SCI +1
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] With the development of attack technology in password implementation, attackers often use multiple attack methods to attack, and are no longer limited to energy attacks or fault attacks. In this scenario, the protection method against a single type of attack is no longer applicable.
Protection measures against fault attacks are often studied separately from energy protection measures, so many implementation schemes dedicated to simultaneously protecting energy analysis attacks and fault analysis attacks simply combine energy protection schemes and fault protection schemes, which consumes a lot of resources at the same time It is often not possible to achieve the corresponding security goals very well.
How to rationally and comprehensively use energy protection technology and fault protection technology, there are already some achievements, these achievements have achieved the corresponding safety protection goals to a certain extent, but they all have different problems more or less, such as large resource consumption, Inefficiency and other issues, or there are some potential security loopholes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Comprehensive protection method for resisting side channel and fault attacks
  • Comprehensive protection method for resisting side channel and fault attacks
  • Comprehensive protection method for resisting side channel and fault attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The specific implementation technology of the present invention will be introduced below in conjunction with the corresponding drawings and examples, but the scope of the present invention will not be limited in any form.

[0033] In this example, the SM4 algorithm is used as the target algorithm to implement a comprehensive protection scheme that can resist second-order side channel attacks.

[0034] The SM4 algorithm is the first commercial block cipher algorithm officially announced by my country. It is of great significance to the construction of the national cryptographic security system. It is a block cipher algorithm with a block length of 128 bits and a key length of 128 bits. Its encryption algorithm and decryption algorithm structure are the same, both adopt 32-round unbalanced Feistel iterative structure, but the encryption key and decryption key are reversed.

[0035] Such as figure 1 As shown, SM4 performs encryption operations in units of words, and the f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a comprehensive protection method for resisting side channel and fault attacks, which comprises the following steps of: 1) for a target algorithm to be protected, constructingan algorithm which is the same as the target algorithm as a redundancy algorithm of the target algorithm; respectively constructing the same d-order threshold protection scheme for the target algorithm and the redundant algorithm thereof, wherein the same d-order threshold protection scheme is used for protecting the d-order side channel attack; 2) carrying out exclusive OR on the output of the target algorithm and the output of the redundant algorithm, then carrying out multiplication mask operation on the output of the target algorithm and a random number, and protecting the multiplication operation by adopting a threshold implementation technology; 3) carrying out exclusive OR on the processing result of the step 2) and the d-order threshold implementation structure of the target algorithm or the d-order threshold implementation structure of the redundant algorithm to obtain a result, and taking the result as a final output result of the target algorithm. The method can resist faultsensitivity attacks not based on ciphertext, differential fault attacks based on ciphertext and side channel attacks.

Description

technical field [0001] The invention relates to a comprehensive protection method based on a threshold realization technology and a multiplication mask, which can be applied to fields such as side channel attack protection and fault attack protection of block ciphers. Background technique [0002] Block cipher is an important branch of cryptography. It is a cryptographic system in which both parties in communication use the same key for encryption and decryption. It has the advantages of fast operation speed and less resource occupation. It is an important part of the cryptographic system and plays a pivotal role in information security protection in many fields such as the Internet of Things. [0003] In the field of traditional cryptography, people pay more attention to the theoretical security of cryptographic algorithms. The security assumption generally refers to the operations that the attacker can have certain authority on plaintext, such as known plaintext, known cip...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/00
CPCH04L9/003H04L9/004H04L9/0631
Inventor 焦志鹏陈华匡晓云冯婧怡杨祎巍黄开天范丽敏
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products