Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption method for preventing continuous leakage attacks

An encryption method and encryption algorithm technology, which is applied to key distribution, can solve problems such as difficult information encryption methods, and achieve the effect of improving security

Inactive Publication Date: 2014-11-26
SUZHOU UNIV
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the rapid development of information technology today, people can enjoy the convenience brought by information technology, but at the same time, the security of information is also being challenged more and more. How to ensure the security of information and how to improve the effectiveness of encryption methods It's a problem all over the world
[0003] The encryption technology commonly used by people can prevent attackers from obtaining confidential content. However, if an attacker uses a side channel to launch a leak attack, the attacker can crack the security system and make it possible to obtain confidential information. Therefore, people need more Encryption methods that meet your needs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The technical solutions in the embodiments of the present invention will be described clearly and completely below. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0017] The embodiments of the present invention include:

[0018] An encryption method to prevent continuous leakage attacks, the steps include:

[0019] 1) Generate key:

[0020] Set a public key and a private key;

[0021] From the set of prime numbers Select evenly , And set the private key ,among them, It is a random integer, and the detailed process of key generation is:

[0022] Given safety parameters , And randomly from the set of prime numbers Select the private key prime number set u= , Where q is a prime number, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption method for preventing continuous leakage attacks. The method includes the following steps: secret-key generation, encryption method generation, secret-key updating and information decryption. Through the above-mentioned method, the encryption method for preventing the continuous leakage attacks designs a method for preventing continuous initiation of leakage attacks of secret information by an attacker on the basis of a quadratic residue difficulty hypothesis and through updating of portions stored in different devices, the attacker is still incapable of cracking a security system to obtain secret information even content of part of the encryption information is obtained so that the security of the encryption method is improved.

Description

Technical field [0001] The invention relates to the field of information data encryption, in particular to an encryption method for preventing continuous leakage attacks. Background technique [0002] With the rapid development of information technology today, people can enjoy the convenience brought by information technology, but at the same time, the security of information is also being challenged more and more. How to ensure the security of information and how to improve the effectiveness of encryption methods It is already a problem for the whole world. [0003] Nowadays, the commonly used encryption technology can prevent attackers from obtaining confidential content. However, if an attacker uses a side channel to initiate a leak attack, the attacker can crack the security system and make it possible to obtain confidential information. Encryption method that meets demand. Summary of the invention [0004] The main technical problem solved by the present invention is to provi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32H04L9/08
Inventor 罗喜召
Owner SUZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products