Unlock instant, AI-driven research and patent intelligence for your innovation.

Defense method for resisting bypass attack based on linear code mask and bit slicing technology

A slicing technology and bypass attack technology, which is applied in the field of defense against bypass attacks, can solve the problems of inapplicability of small embedded devices, lack of implementation methods, and high cost, so as to improve the ability to resist bypass attacks and reduce overhead , the effect of increasing the likelihood

Active Publication Date: 2022-02-15
ZHEJIANG UNIV
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the masking scheme based on linear codes is too costly and requires high computing resources, which is not suitable for small embedded devices; on the other hand, the current masking scheme based on linear codes is only based on theoretical derivation and lacks specific The realization method still has a certain distance from practice and engineering application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Defense method for resisting bypass attack based on linear code mask and bit slicing technology
  • Defense method for resisting bypass attack based on linear code mask and bit slicing technology
  • Defense method for resisting bypass attack based on linear code mask and bit slicing technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] The present invention will be described in detail below according to the accompanying drawings.

[0065] The present invention is a defense method against bypass attacks based on linear code mask and bit slicing technology, which is applicable to any packet encryption algorithm, and can be flexibly adapted to various electronic encryption devices; it includes the following steps:

[0066] Step 1: Enter a length of l The plaintext information to be encrypted. By grouping the plaintext information, we get l / k plaintext vectors of length k x i , the input encoding function f Enc , get the mask vector group . k is l The factor of , the specific value is defined by the user according to the security needs; 1≤i≤ l / k.

[0067] encoding function output vector for:

[0068]

[0069] in, r i is a vector in the Galois field (hereinafter referred to as the field) with a length of m, and the vector elements are randomly generated. A is a generator matrix with...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a defense method for resisting a bypass attack based on a linear code mask and bit slicing technology. The linear code mask is a type of mask with complex algebraic calculation. Compared with a Boolean mask, the linear code mask has higher security and can more effectively resist bypass attacks, but the implementation is more complicated, and the required overhead and calculation cost are higher, so that the method is not suitable for being applied to various small embedded devices. By combining the linear code mask with the bit slicing technology, the universal defense method for resisting bypass attack based on the linear code mask, which can be flexibly adapted to various embedded devices is provided. The method can be flexibly combined with various block passwords, is low in cost, is simple and convenient to implement, and can effectively meet the security requirement of the encrypted electronic equipment for resisting the bypass attack.

Description

technical field [0001] The invention belongs to the field of bypass security, in particular to a defense method against bypass attacks based on linear code mask and bit slice technology. Background technique [0002] Traditional side-channel attacks are a potentially significant threat to existing encrypted devices, especially for small embedded devices with little protection. All kinds of passive leaks during the operation of electronic equipment will give attackers with side-channel attack techniques opportunities to take advantage of, and these leaks include time, power consumption, electromagnetic radiation, and temperature. In order to resist such threats, various protection strategies have been proposed in the past ten years, among which a type of strategy with relatively large influence and considered to be more effective is called "masking". "Masking" refers to splitting the sensitive variable x during the running of the algorithm into n "allocated" variables, so th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F21/60
CPCG06F21/55G06F21/602
Inventor 张帆吴茜眉
Owner ZHEJIANG UNIV