Hybrid denoising power consumption analysis method for cryptographic algorithm and terminal

A cryptographic algorithm and power analysis technology, applied in the fields of information security and side channel analysis, can solve the problem of limited improvement of noise power analysis accuracy, achieve simple and fast security testing, improve conversion efficiency, enhance efficiency and accuracy

Active Publication Date: 2021-03-26
CHONGQING UNIV OF POSTS & TELECOMM
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These single power consumption signal denoising methods have limited effect on noise suppression and improvement in the accuracy of power consumption analysis.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hybrid denoising power consumption analysis method for cryptographic algorithm and terminal
  • Hybrid denoising power consumption analysis method for cryptographic algorithm and terminal
  • Hybrid denoising power consumption analysis method for cryptographic algorithm and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0026] The foregoing and other technical contents, features and effects of the present invention will be clearly presented in the following detailed description of preferred embodiments with reference to the drawings. Through the description of specific implementation methods, the technical means and effects of the present invention to achieve the intended purpose can be understood more deeply and specifically, but the attached drawings are only for reference a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a hybrid denoising power consumption analysis method for a cryptographic algorithm and a terminal, and belongs to the field of information security and side channel attack. The method comprises the following steps: selecting an actual intermediate value attack point, determining a required actual intermediate value, inputting a plaintext into encryption equipment running acryptographic algorithm, and acquiring power consumption signal data during encryption; preprocessing the obtained power consumption signal data by using a denoising method of mixing low-pass filtering and an empirical mode threshold to obtain denoised power consumption signal data; constructing an actual power consumption matrix by using the preprocessed power consumption signal data, and calculating an assumed intermediate value to obtain an assumed power consumption matrix; and calculating a correlation coefficient between the actual power consumption matrix and the assumed power consumption matrix, and obtaining a correct key. According to the invention, the noise in the power consumption signal is reduced, the signal-to-noise ratio is increased, and the efficiency and accuracy of password attack are improved.

Description

technical field [0001] The invention belongs to the technical field of information security and side channel analysis, and in particular relates to a hybrid denoising power analysis method and a terminal for cryptographic algorithms. Background technique [0002] Today, the development of cryptography has significantly improved the security of encryption algorithms. It is difficult for traditional mathematical attack methods to effectively attack current encryption algorithms such as AES; however, the emergence of side-channel attacks has enabled AES to resist traditional mathematical The analyzed encryption algorithm has been compromised. Side channel attack is a non-intrusive attack method. During the process of running the encryption algorithm, the cryptographic chip will leak some energy and electromagnetic radiation through the side channel. The side channel attack uses the information leaked from these side channels. Profiling is a form of side-channel attack in which...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04L29/06H04L9/06G06K9/00G06K9/40G06F17/14G06F17/16
CPCH04L9/003H04L63/1433H04L9/0631H04L63/1441G06F17/16G06F17/148G06V10/30G06F2218/06G06F2218/04Y02D10/00
Inventor 程克非宋子言
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products