Attack method and system for side channel password energy leakage signal

A technology for leaking signals and side channels, which is applied in the field of attack methods and systems for side-channel cryptographic energy leaking signals, can solve problems such as energy model, calculation amount and equipment limitations, and achieve the effect of small calculation amount and low complexity.

Active Publication Date: 2019-11-15
北京银联金卡科技有限公司
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The present invention provides an attack method and system for side-channel cipher energy leakage signals, which are used to solve the problem of energy model, calculation amount and equipment limitations in the process of securely authenticating the key of a cipher device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack method and system for side channel password energy leakage signal
  • Attack method and system for side channel password energy leakage signal
  • Attack method and system for side channel password energy leakage signal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0037] image 3 Schematic flow chart provided for the embodiment of the present invention Figure 1 , for summarizing the technical solution of the present invention, such as image 3 Shown:

[0038] Step 101, collecting energy leakage signals, selecting an energy model and an intermediate value to be attacked.

[0039] A random data is g...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an attack method and a system for a side channel password energy leakage signal. The method comprises the following steps: establishing an assumed energy consumption matrix andclassifying energy data by utilizing sub-key guessing; and carrying out data processing on the classification result and the energy leakage curve to obtain a statistical value, and then solving a meanvalue to obtain a discriminator value of the guessed sub-key at the time point; and judging whether all guessed sub-keys are traversed or not, and traversing the energy data at all time points; and if the abscissa corresponding to the maximum discriminator value is selected as the sub-key, comparing the sub-key with the real key to judge whether the cryptographic equipment is safe. In the attackprocess of the energy leakage signal, model assumption does not need to be carried out on the energy leakage signal, the method does not depend on any fixed or proportional model, and the real key ofthe cryptographic equipment is recovered only by analyzing the distribution characteristics of the energy leakage signal under different sub-key guessing conditions. Due to the fact that distributionof the leakage signals is directly analyzed and does not depend on a linear measurement mode, nonlinear characteristics of the energy leakage signals can be fully mined.

Description

technical field [0001] The invention relates to the technical fields of side-channel cryptanalysis, mathematical statistics and information security, in particular to an attack method and system for side-channel cipher energy leakage signals. Background technique [0002] Such as figure 1 As shown, when the cryptographic device is running the cryptographic algorithm, due to the energy characteristics of the CMOS device, the cryptographic device will always leak information related to the cryptographic algorithm. The leaked information includes but is not limited to: electromagnetic information, energy loss information, sound information, etc. Side-channel cryptanalysis uses the leaked information above and combines the key information of the discriminator to successfully crack the key information of the cryptographic algorithm, which poses a serious threat to the cryptographic equipment in the actual use process. [0003] To prevent this threat, cryptographic devices are ce...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00
CPCH04L9/003
Inventor 周新平乔珂欣王洁张永峰马哲
Owner 北京银联金卡科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products