Attack test method and device

A technology of collision attack and detection method, applied in the direction of security device, public key of secure communication, digital transmission system, etc., can solve the problems of no protection of encryption algorithm, discarding attack data, etc., and achieve the effect of reducing requirements and speeding up

Inactive Publication Date: 2011-05-04
GIESECKE & DEVRIENT (CHINA) INFORMATION TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] Another object of the present invention is to provide a collision attack detection device, which is used to solve the lack of protection for the encryption algorithm in the prior art. The input data is analyzed, and if it meets the requirements, the encryption operation can be performed; otherwise, the attack data is directly discarded.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack test method and device
  • Attack test method and device
  • Attack test method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with the embodiments and accompanying drawings. Here, the exemplary embodiments and descriptions of the present invention are used to explain the present invention, but not to limit the present invention.

[0040] Embodiments of the present invention are provided. The present invention will be described in detail below in conjunction with the accompanying drawings.

[0041] like figure 2 Shown is the flow chart of the present invention, judging whether the received plaintext is data with a selected plaintext attack mode includes the following steps, step 201, receiving a plurality of plaintexts and storing them. Step 202, judging whether at least two of the plaintexts have only one bit difference or are completely the same. Step 203, if the above judgment is negative, output no attack signal. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a collision attack test method and a device. The invention provides the collision attack test method aiming to solve chosen-plaintext attack of a key in an encryption algorithm of the prior art. The method comprises the following steps: receiving a plaintext; storing at least one part of the plaintext; judging whether the analogical number of the stored at least one part of the plaintext and other stored at least one part of the plaintext is more than or equal to a first threshold value; outputting a signal with an attack mode in the current plaintext if the analogical number is more thanor equal to the first threshold value, otherwise, outputting a normal signal; and repeating the steps before the next plaintext comes. The method and the device have the advantages that the method and the device can test the inputting plaintext with obvious attack mode and avoid the chosen-plaintext attack on the key.

Description

technical field [0001] The invention relates to the field of security detection, in particular to the field of security detection of smart cards, and specifically relates to a collision attack detection method and device. Background technique [0002] In an encryption algorithm, a key is used to encrypt plaintext into ciphertext. Here, the term encryption algorithm is to be understood as an algorithm for calculating an identification code with respect to plaintext. Such an algorithm is also called a hash function with a key (cryptographic hash function). Here, the identification code of the plaintext is calculated from the plaintext using the key. In general, contrary to true encryption algorithms in the narrower sense, such functions cannot be reversed, ie decryption can no longer be performed. [0003] An encryption algorithm is used, for example, to authenticate a first instance against a second instance. To this end, for example, the first instance encrypts the plain...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/26H04W12/06H04W12/10H04L9/30H04W12/122
Inventor 周源远李军
Owner GIESECKE & DEVRIENT (CHINA) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products