Secure lightweight McEliece public key mask encryption method

An encryption method and masking technology, which is applied in the field of information security, can solve the problems of being unable to resist power consumption analysis and large key size, and achieve the effects of resisting power consumption analysis, resisting quantum computing attacks, and reducing the volume of keys

Inactive Publication Date: 2017-06-30
JIANGSU UNIV
View PDF7 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to provide a safe and lightweight McEliece public key mask encryption method to solve the problem that the McEliece algorithm has a large key body and cannot resist power analysis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure lightweight McEliece public key mask encryption method
  • Secure lightweight McEliece public key mask encryption method
  • Secure lightweight McEliece public key mask encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The following are specific embodiments of the present invention, and further clearly and completely describe the technical solutions of the present invention in conjunction with the accompanying drawings. The quasi-dyadic error-correcting code C has code length n=128, dimension k=64, codimension r=64, and code error-correcting ability t=49.

[0046] A secure and lightweight McEliece-type public key encryption method based on Quasi-Dyadic MDPC codes, including the construction of McEliece encryption algorithms with small key size and the design of mask protection methods against energy analysis attacks :

[0047] One, the construction process of the Quasi-Dyadic MDPC code McEliece cryptographic algorithm that described key volume is little comprises the steps:

[0048]Step 1, construct Quasi-Dyadic MDPC code: in finite field Above, the form of the density check matrix is ​​designed, n in this embodiment 0 = 2:

[0049] H=[H 0 |H 1 ] (1)

[0050] where H 0 and H ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a secure lightweight McEliece public key mask encryption method, and belongs to the technical field of information security. Design of the method is divided into two parts: constructing a Quasi-Dyadic MDPC code McEliece cipher code algorithm with a lightweight key and designing a mask protecting scheme that resists power-consumption analysis. According to the method of the present invention, a Quasi-Dyadic MDPC code is constructed and applied to a McEliece cipher code algorithm, so that the volume of a key is effectively reduced. According to the method of the present invention, mask technology is also used to design a protecting scheme, enabling the McEliece cipher code algorithm to resist power-consumption analysis. Meanwhile, the present invention solves the security problem that power consumption caused by using an ISW provable security framework core algorithm to generate a random number is prone to leak a share a and a share b simultaneously. The highly secure and highly efficient McEliece public key cipher code algorithm designed according to the method of the present invention is more applicable to an embedded environment with limited resources.

Description

technical field [0001] The invention relates to the McEliece asymmetric encryption technology capable of resisting quantum computing attacks in the technical field of information security. In particular, it relates to an implementation technology of a Quasi-Dyadic MDPC code-based McEliece public key mask encryption algorithm considering side channel security, and the method can resist power consumption analysis. Background technique [0002] The rapid development of quantum computers poses a serious threat to cryptographic algorithms based on difficult number theory problems, especially the proposal of the Shor quantum algorithm, which makes researchers believe that RSA, ECC and other commonly used cryptographic algorithms based on difficult number theory problems will no longer be safe. [0003] Cryptographic schemes based on error-correcting codes can resist quantum computing attacks. However, the original McEliece cryptographic algorithm based on Goppa codes has a large k...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04L9/08
CPCH04L9/003H04L9/0825
Inventor 韩牟王运文马世典冯晓林
Owner JIANGSU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products