Defense method for resisting bypass attack based on linear code mask and bit slicing technology
A slicing technology and bypass attack technology, which is applied in the field of defense against bypass attacks, can solve the problems of inapplicability of small embedded devices, lack of implementation methods, and high cost, so as to improve the ability to resist bypass attacks and reduce overhead , the effect of increasing the likelihood
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0064] The present invention will be described in detail below according to the accompanying drawings.
[0065] The present invention is a defense method against bypass attacks based on linear code mask and bit slicing technology, which is applicable to any packet encryption algorithm, and can be flexibly adapted to various electronic encryption devices; it includes the following steps:
[0066] Step 1: Enter a length of l The plaintext information to be encrypted. By grouping the plaintext information, we get l / k plaintext vectors of length k x i , the input encoding function f Enc , get the mask vector group . k is l The factor of , the specific value is defined by the user according to the security needs; 1≤i≤ l / k.
[0067] encoding function output vector for:
[0068]
[0069] in, r i is a vector in the Galois field (hereinafter referred to as the field) with a length of m, and the vector elements are randomly generated. A is a generator matrix with...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


