Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for defending side channel attack and readable storage medium

A side-channel attack and product technology, applied in the computer field, can solve problems such as weak algorithms and inability to directly add masks, and achieve the effect of resisting differential power attack and simple power attack.

Active Publication Date: 2020-11-13
网御安全技术(深圳)有限公司
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

private key A Participating operations include linear addition and modulo operations, which can be directly protected by adding a mask, but the private key d A The inversion operation involved is not a linear operation, and the mask cannot be added directly during protection, which becomes the weak point of the algorithm for attackers to attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for defending side channel attack and readable storage medium
  • Method and device for defending side channel attack and readable storage medium
  • Method and device for defending side channel attack and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0043] The specific implementations / examples described here are specific specific implementations of the present invention, and are used to illustrate the concept of the present invention. limit. In addition to the embodiments described here, those skilled in the art can also adopt other obvious technical solutions based on the claims of the application and the contents disclosed in the description, and these technical solutions include adopting any obvious changes made to the embodiments described here. The replacement and modified technical solutions are all within the protection scope of the present invention.

[0044] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0045] figure 1 It is a flow chart of Embodiment 1 of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and device for defending a side channel attack, and a readable storage medium. The method, when adding a mask to modular inversion operation, comprises the followingsteps: obtaining a base number a, a modulus p and a random number r2 participating in modular inverse operation; calculating an intermediate variable e related to the modulus p according to e = p-2; performing mask multiplication processing of the random number r2 on the base number a to obtain an updated base number a; respectively constructing the power b = aemodp with a mask and the power c = r2emodp with a mask, and calculating the values of b and c; and outputting an operation result s according to s = b * cmodp. By implementing the technical scheme of the invention, simple power consumption attacks and differential power consumption attacks can be resisted.

Description

technical field [0001] The invention relates to the field of computers, in particular to a method, device and readable storage medium for defending against side channel attacks. Background technique [0002] Power consumption information is leaked when the hardware circuit performs cryptographic operations. The power consumption information is sampled and analyzed statistically. Side-channel attacks are divided into simple power consumption attacks and differential power consumption attacks. Simple power consumption attacks use circuit execution time information leakage for analysis. , the differential power consumption attack uses the correlation between the power consumption information leaked when the circuit performs operations and the key value information, and uses statistical analysis techniques to recover the key. [0003] Regarding the differential power consumption attack, since the cryptographic device will leak the power consumption information related to the var...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55
CPCG06F21/556
Inventor 不公告发明人
Owner 网御安全技术(深圳)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products