Modular multiplication remainder input side channel attack for m-ary of rsa

An input side and side channel technology, applied in the field of cryptographic algorithm analysis and detection, can solve problems such as inability to use SPA, and achieve the effects of improving the attack success rate, reducing analysis time, and reducing the amount of data

Active Publication Date: 2018-06-12
CHENGDU UNIV OF INFORMATION TECH +3
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, under different exponents (same bit), the M-ary algorithm has a fixed number and position of square operations and multiplication operations in each round, and cannot be analyzed by SPA, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Modular multiplication remainder input side channel attack for m-ary of rsa
  • Modular multiplication remainder input side channel attack for m-ary of rsa
  • Modular multiplication remainder input side channel attack for m-ary of rsa

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] The specific embodiments of the present invention are described below so that those skilled in the art can understand the present invention, but it should be clear that the present invention is not limited to the scope of the specific embodiments. For those of ordinary skill in the art, as long as various changes Within the spirit and scope of the present invention defined and determined by the appended claims, these changes are obvious, and all inventions and creations using the concept of the present invention are included in the protection list.

[0067] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and simulation examples. The detailed attack flow chart is as follows: Figure 5 .

[0068] Let the base, exponent, and modulus of the remainder of the power be 4 bits, the window width M be 2 bits, and input 9 g...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for analyzing the energy of the modular multiplication remainder input side channel energy analysis attack method for the RSA cryptographic algorithm M-ary. attack. It includes the following steps: (1) collect signals and establish a sampling matrix; (2) select the modulo multiplication remainder input as the attack object; (3) determine the correlation model; (4) guess the round index value and calculate the intermediate value matrix; (5) ) Calculate the simulated energy consumption matrix; (6) Calculate the linear correlation coefficient between the corresponding measurement point in (1) and the matrix determined in (5), and obtain the correct input value of the modular multiplication remainder for all rounds. Search to get all the correct round indices, and get the complete index after concatenation. The method of the invention provides a new M-ary side channel attack method, which enhances the flexibility, effectiveness and success rate of RSA cryptographic algorithm analysis attacks.

Description

technical field [0001] The invention relates to the field of analysis and detection of cryptographic algorithms, in particular to a method for analyzing and attacking the energy of a modular multiplication remainder input side channel realized by the RSA cryptographic algorithm M-ary. Background technique [0002] With the development of information and analysis circuit technology, the cracking of hardware cryptographic electronic equipment no longer simply stays on the protocol and algorithm, but starts with the information leaked in the process of processing data. In the process of processing information, hardware cryptographic electronic equipment leaks information such as energy, electromagnetics, errors, and time. Using these leaked information to attack cryptographic electronic equipment is the so-called Side Channel Attacks. It can be divided into energy analysis attack, electromagnetic attack, error attack, etc. Among them, energy analysis attack has become the main ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06
Inventor 吴震杜之波饶金涛王敏李大为罗鹏赵东艳张海峰唐晓柯胡晓波甘杰刘辉志
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products