A crt-rsa chosen plaintext joint attack method and system

A CRT-RSA and plaintext selection technology, applied in the field of CRT-RSA selection plaintext joint attack methods and systems, can solve the problem of no multi-point information leakage, avoid local collision attack errors, improve attack accuracy, and reduce noise impact. Effect

Active Publication Date: 2021-07-30
CHENGDU UNIV OF INFORMATION TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] And from the literature review, there is currently no indirect attack on the key parameter d for CRT-RSA p and d q , and then deduce the side-channel attack method of prime numbers p, q, and there is no combination of multi-point information leakage, and the secondary processing of the power consumption difference in plaintext is used as the choice of plaintext side-channel attack method for the classification data set

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A crt-rsa chosen plaintext joint attack method and system
  • A crt-rsa chosen plaintext joint attack method and system
  • A crt-rsa chosen plaintext joint attack method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0100] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0101]At present, the side-channel attack methods for the CRT-RSA algorithm focus on directly attacking the leakage of power consumption information related to the prime numbers p and q. There are already corresponding defense methods for these side-channel attack methods. p, q cannot be effectively attacked.

[0102] The present invention will be further described below in conjunction with specific embodiments.

[0103] like figure 1 , the CRT-RSA chosen plaintext joint attack method that the embodiment of the present invention provides, comprises:

[0104] (1) Calculate n groups of specific plaintext pairs (M, M'):

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of information security, and discloses a CRT-RSA selected plaintext joint attack method and system. During the attack process, the d p and d q As the attack target, then derive the private key parameters p, q; in the plaintext collision attack process, select multiple sets of plaintext pairs, superimpose them, and do secondary processing on the power consumption difference of the model multiplication as a collision classification set; in the attack process, Combined with the disclosure of the Hamming weight information of the access number power consumption exponent during the CRT-RSA modular exponentiation operation, the modular multiplication power consumption is segmented, and the segmented plaintext collision attack is implemented. The present invention combines the problems of other information leaks (such as access number power consumption exponent Hamming weight information leak) in the CRT-RSA modular exponentiation process, performs modular multiplication power consumption segmentation, and implements segmentation selection plaintext collision attacks, which can avoid partial The collision attack is wrong, thereby improving the attack accuracy, and finally deriving the private key parameters p, q, and recovering the private key d value.

Description

technical field [0001] The invention belongs to the field of information security, in particular to a CRT-RSA selected plaintext combined attack method and system. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: [0003] Most smart cards use the RSA cryptographic algorithm to realize the digital signature authentication function, but the fastest RSA encryption speed is 100 times slower than DES, regardless of software or hardware implementation, the speed has always been the defect of RSA. Since 1982, two Belgian scholars (Quisquate & Couvreur) proposed a variant algorithm of RSA based on the Chinese Remainder Theorem (Chinese Remainder Theorem CRT). The storage space of the table also reduces the execution speed of multiplication in the algorithm, so CRT-RSA is widely used in smart cards and embedded devices. [0004] In the standard RSA encryption algorithm, the RSA modulus N is the product of two large pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30H04L9/00
CPCH04L9/002H04L9/003H04L9/302H04L9/3249
Inventor 万武南陈俊
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products