Attack verification and protection method and device for SM2 signature algorithm
A verification method and verification device technology, which is applied in the direction of secure communication devices, user identity/authority verification, countermeasures against encryption mechanisms, etc., can solve problems that cannot be guessed and attackers do not know, and achieve the effect of improving encryption security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0080] Embodiment 1 of the present invention provides an attack verification method for the SM2 signature algorithm, including the step of: performing an error injection attack on the addition position of the SM2 signature algorithm.
[0081] The error injection attack is carried out at the addition calculation position, the addition is easily skipped, and the value of the register corresponding to the addition result will not change, and it is still the latest value. And this kind of error will not be found, that is, it can pass the verification. This shows that the protected SM2 encryption algorithm in the prior art has security risks.
Embodiment 2
[0083] Embodiment 2 of the present invention provides a preferred embodiment of an attack verification method for the SM2 signature algorithm. see figure 1 As shown, in this embodiment, the attack verification method includes steps:
[0084] S201, measuring the energy trace of the SM2 signature, that is, the power consumption waveform;
[0085] S202, find and calculate the time position of temp1=k+r on the power consumption waveform through SPA analysis;
[0086] S203, perform laser error injection at this time position;
[0087] S204, injecting repeatedly at the same time to obtain wrong data.
[0088] Preliminary analysis of the erroneous data shows that r will have a special fixed value in the obtained erroneous data, and the fixed value is the hash value e of the plaintext required by the SM2 signature, that is, r=e. The formula for calculating r in SM2 is r=x1+e, indicating that the attack causes this addition to be bypassed, and the value of the register storing r ha...
Embodiment 3
[0093] Embodiment 3 of the present invention provides an attack verification device for the SM2 signature algorithm, including an attack module for performing an error injection attack on the addition position of the SM2 signature algorithm.
[0094] As a preferred solution, the attack module includes:
[0095] The measurement unit is used to measure the energy trace of the SM2 signature, that is, the power consumption waveform;
[0096] The analysis unit is used to find the position of the addition process of calculating temp1 on the power consumption waveform through SPA analysis, and record the time point corresponding to the position as the trigger time point;
[0097]The interference unit is used for performing laser injection at the trigger time point to interfere with the addition process; and repeating the laser injection at the trigger time point to obtain wrong data.
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com