Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for detecting resistance of HAS-160 algorithm to differential fault attack

A differential fault attack and algorithm technology, which is applied in the field of cryptographic algorithm security, can solve security risks, evaluate HAS-160 algorithm against differential fault attacks, etc., and achieve the effect of easy implementation, accurate and simple method

Pending Publication Date: 2016-06-22
DONGHUA UNIV
View PDF1 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There is currently no public report evaluating the ability of the HAS-160 algorithm to resist differential fault attacks, which leaves a security risk for products that are being packaged using the HAS-160 algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting resistance of HAS-160 algorithm to differential fault attack
  • Method for detecting resistance of HAS-160 algorithm to differential fault attack
  • Method for detecting resistance of HAS-160 algorithm to differential fault attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051]Below in conjunction with specific embodiment, further illustrate the present invention. It should be understood that these examples are only used to illustrate the present invention and are not intended to limit the scope of the present invention. In addition, it should be understood that after reading the teachings of the present invention, those skilled in the art can make various changes or modifications to the present invention, and these equivalent forms also fall within the scope defined by the appended claims of the present application.

[0052] When using the HAS-160 algorithm to process the same message M with the same key, if the experimental environment (such as clock, voltage, humidity, radiation, pressure, light and eddy current, etc.) is different, the attacker can obtain the correct output C respectively and error output C * , by calculating the output difference value of these two values ​​(ie ), the key information can be deduced. An attacker can in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for detecting resistance of an HAS-160 algorithm to a differential fault attack. The method includes the steps of: randomly generating a plaintext message to be processed; utilizing the HAS-160 algorithm to process the plaintext message to obtain correct output and error output; calculating difference values of the correct output and the error output; and analyzing the difference values, judging whether the HAS-160 algorithm is influenced by a differential fault attack, deriving the position of fault import, and analyzing validity of the position. The method provided by the invention can assess the capability of the HAS-160 algorithm of resisting the differential fault attack.

Description

technical field [0001] The invention relates to the security field of cryptographic algorithms, in particular to a method for detecting the HAS-160 algorithm against differential fault attacks. Background technique [0002] From ancient times to the present, information security issues have always been the object of people's attention. With the popularization of digital management, information security issues have been extended to the issue of algorithm security in cryptography. The HAS-160 algorithm is a hash function used in the Korean digital signature standard. Its structure is similar to the SHA-1 algorithm. On the basis of SHA-1, some changes have been made to increase the strength of the algorithm. The HAS-160 algorithm does not have a loop when expanding the plaintext, which greatly increases the security of the algorithm. However, the block cipher characteristics of the HAS-160 algorithm make it unable to escape the threat of differential fault attacks. [0003] Th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00
CPCH04L9/004
Inventor 李玮葛晨雨高志勇曹艳琴夏小玲曹奇英黄利利
Owner DONGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products