Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Side channel attack method for implementation of RSA (Rivest, Shamir and Adleman) cipher algorithms M-ary

A cryptographic algorithm and side-channel technology, applied in the field of side-channel energy analysis attacks, can solve problems such as the inability to use SPA analysis, and achieve the effects of less interference, less analysis time, and less data volume.

Active Publication Date: 2015-07-22
CHENGDU UNIV OF INFORMATION TECH +3
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, under different exponents (same bits), the M-ary algorithm has a fixed number and position of square operations and multiplication operations in each round, and cannot be analyzed by SPA, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Side channel attack method for implementation of RSA (Rivest, Shamir and Adleman) cipher algorithms M-ary
  • Side channel attack method for implementation of RSA (Rivest, Shamir and Adleman) cipher algorithms M-ary
  • Side channel attack method for implementation of RSA (Rivest, Shamir and Adleman) cipher algorithms M-ary

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] The specific embodiments of the present invention are described below so that those skilled in the art can understand the present invention, but it should be clear that the present invention is not limited to the scope of the specific embodiments. For those of ordinary skill in the art, as long as various changes Within the spirit and scope of the present invention defined and determined by the appended claims, these changes are obvious, and all inventions and creations using the concept of the present invention are included in the protection list.

[0067] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and simulation examples.

[0068] Let the base, exponent, and modulus of the remainder of the power be 4 bits, the window width M be 2 bits, and input 9 groups of test cases, use the same exponent, modulus, and di...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a side channel energy analytical attack method by the aid of multiplication output during implementation of power residue computing algorithms M-ary in RSA (Rivest, Shamir and Adleman) cipher algorithms. A core of the side channel energy analytical attack method includes that multiplication output is used as an attack object to implement CPA (correlation power attack) when power residue computing is implemented by the aid of the algorithms M-ary. The method includes steps of (1), acquiring signals and building sampling matrixes; (2), selecting the multiplication output to be used as the attack object; (3), determining correlation models; (4), guessing circulation index values and acquiring intermediate value matrixes by means of computing; (5), acquiring simulation energy consumption matrixes by means of computing; (6), acquiring linear correlation coefficients among the matrixes determined in the steps (1) and (5) by means of computing and obtaining correct circulation indexes by means of attacking; (7), repeatedly carrying out steps (4), (5) and (6) to obtain all correct circulation indexes by means of attacking, and serially connecting all the correct circulation indexes with one another to obtain complete indexes. The side channel energy analytical attack method has the advantages that the RSA cipher algorithm analytical attack flexibility and effectiveness can be enhanced by the aid of the novel side channel attack method for the algorithms M-ary, and an RSA cipher algorithm analytical attack success rate can be increased by the aid of the novel side channel attack method for the algorithms M-ary.

Description

technical field [0001] The invention relates to the field of analysis and detection of cryptographic algorithms, in particular to a method for analyzing side channel energy analysis attacks aimed at the multiplication output when the power residue calculation M-ary in the RSA cryptographic algorithm is realized. Background technique [0002] With the development of information and analysis circuit technology, the cracking of hardware cryptographic electronic equipment no longer simply stays on the protocol and algorithm, but starts from the information leaked in the process of processing data to crack. In the process of processing information, hardware cryptographic electronic equipment leaks information such as energy, electromagnetics, errors, and time. Using these leaked information to attack cryptographic electronic equipment is the so-called Side Channel Attacks (Side Channel Attacks). It can be divided into energy analysis attack, electromagnetic attack, error attack, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
Inventor 吴震杜之波饶金涛王敏李大为罗鹏郑晓光刘剑峰
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products