Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An information processing method, system and related components based on rsa algorithm

An information processing method and RSA algorithm technology, applied in the field of information security, can solve problems such as security chip application threats, and achieve the effects of resisting power consumption type side channel attacks, defending side channel attacks, and improving protection capabilities.

Active Publication Date: 2021-10-15
苏州国芯科技股份有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This algorithm has withstood many years of traditional mathematical cryptanalysis, but due to the development of computers and the rise of side channel attacks, the application of security chips equipped with this algorithm in cryptographic devices is facing serious threats

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An information processing method, system and related components based on rsa algorithm
  • An information processing method, system and related components based on rsa algorithm
  • An information processing method, system and related components based on rsa algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0048] see below figure 1 , figure 1 It is a flow chart of an information processing method based on the RSA algorithm provided by the embodiment of the present application.

[0049] Specific steps can include:

[0050] S101: When receiving an information processing instruction, determine target information m, modulus n, private key d, first prime ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses an information processing method based on the RSA algorithm. The information processing method includes, when an information processing instruction is received, determining the target information m, the modulus n, the private key d, the first prime number p and The second prime number q; perform mask processing on the target information m to obtain mask information m', perform blind operation-based modular exponentiation on the mask information m' according to the first prime number p and the second prime number q to obtain the first processing result and the second processing result; when the power exponent of the first processing result and the second processing result is 0 or 1, perform a corresponding consistent processing operation so as to add random noise; according to the first processing result and the second processing result after adding random noise 2. Processing the result to generate a decryption result or a signature result of the target information. The method can effectively defend against side channel attacks and improve the security of the information processing process. The application also discloses an electronic device, which has the above beneficial effects.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an information processing method based on an RSA algorithm and an electronic device. Background technique [0002] The RSA public key encryption algorithm was developed by Ron Rivest, Adi Shamirh and Len Adleman in 1977. It is a safe and practical public key encryption algorithm. It can be used for both data encryption and digital signature. It is currently the most widely used Extensive public-key cryptographic algorithms. This algorithm has withstood many years of traditional mathematical cryptanalysis, but due to the development of computers and the rise of side-channel attacks, the application of security chips equipped with this algorithm in cryptographic devices is facing serious threats. [0003] At present, the side-channel attack methods for the RSA public key encryption algorithm include simple power analysis SPA, differential power analysis DPA, relative ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/30
CPCH04L9/0869H04L9/302
Inventor 郑茳肖佐楠万刘蝉匡启和汪建强
Owner 苏州国芯科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products