Unlock instant, AI-driven research and patent intelligence for your innovation.

Template-based rsa-crt private key recovery method and system for module reduction attack

A technology of RSA-CRT and RSA algorithm, which is applied in the direction of transmission system, digital transmission system, public key of secure communication, etc., and can solve the problem that the private key cannot be recovered

Active Publication Date: 2022-04-19
国家信息技术安全研究中心
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] To this end, the embodiment of the present application provides a template-based RSA-CRT to realize a private key recovery method and system for modulus reduction attacks, based on the Hamming weight model modeling of the intermediate value after modulus reduction, and selecting ciphertext modulus reduction by collecting Perform template matching on the energy traces to obtain the Hamming weight of the intermediate value after modular reduction, and recover the key according to the private key recovery algorithm, which solves the problem that the private key cannot be recovered from the Hamming weight of the intermediate value after modular reduction

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Template-based rsa-crt private key recovery method and system for module reduction attack
  • Template-based rsa-crt private key recovery method and system for module reduction attack
  • Template-based rsa-crt private key recovery method and system for module reduction attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The implementation mode of the present invention is illustrated by specific specific examples below, and those who are familiar with this technology can easily understand other advantages and effects of the present invention from the contents disclosed in this description. Obviously, the described embodiments are a part of the present invention. , but not all examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0059] Some well-known terms in the art are defined as follows:

[0060] Hamming Weight: Calculate the number of non-zero data bits in the binary expansion of the data.

[0061] Energy trace: collect the energy consumption curve of a certain operation of the cryptographic module through the oscilloscope.

[0062] Multivariate normal distribution modeling: Multivariate normal distribution consis...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present application discloses a method and system for recovering a private key based on a template-based RSA-CRT to realize a module reduction attack. State distribution modeling to obtain the template corresponding to the intermediate value byte by byte after modular reduction; based on the template matching method of selected ciphertext, the intermediate value r of the modular reduction operation of the RSA algorithm is obtained, and the private value used by the RSA algorithm is restored from the intermediate value r. key p; decompose the public key n to get the private key q, and thus get the RSA private keys p and q. Based on the Hamming weight model modeling of the intermediate value after modular reduction, the Hamming weight of the intermediate value after modular reduction is obtained by collecting and selecting the energy trace of the ciphertext modular reduction, and the key is recovered according to the private key recovery algorithm , which solves the problem that the private key cannot be recovered from the Hamming weight of the intermediate value after the reduction of the modulus.

Description

technical field [0001] The embodiment of the present application relates to the technical field of cryptography application, and specifically relates to a method and system for recovering a private key based on a template-based RSA-CRT to implement a modulus reduction attack. Background technique [0002] The differential energy analysis proposed by Kocher et al. created the research field of side-channel attack. Side-channel attack mainly studies the recovery of sensitive information by using side-channel information such as energy consumption and electromagnetic radiation leaked in the process of encrypting and decrypting messages by cryptographic equipment. Side channel attacks are mainly divided into two categories, one is modeling attacks, such as template attacks, and the other is non-modeling attacks, such as correlation energy analysis. Based on modeling attacks, the attacker needs to obtain two identical devices, one of which has sufficient control rights, trains th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/30G06F7/72
CPCH04L9/0894H04L9/302G06F7/72G06F7/723
Inventor 李霞王宏马向亮杨丹
Owner 国家信息技术安全研究中心
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More