Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Learning side channel attack method for automatically discovering leakage model and encryption equipment

A side-channel attack and automatic discovery technology, applied in the field of side-channel attack methods and encryption equipment, can solve problems such as side-channel high-order attacks, improve reliability, improve analysis efficiency, and avoid manual reasoning or guessing

Active Publication Date: 2021-07-23
CHENGDU UNIV OF INFORMATION TECH
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Solve side-channel high-level attacks that are currently almost impossible to implement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Learning side channel attack method for automatically discovering leakage model and encryption equipment
  • Learning side channel attack method for automatically discovering leakage model and encryption equipment
  • Learning side channel attack method for automatically discovering leakage model and encryption equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0079] In a specific embodiment, the intermediate combination value fitting network GVNet of the attack model is defined as an input layer width of 48, which is used to input 8-bit data encoded by [-1,1] of a plaintext byte, and a subkey byte of [-1,1] encoded 8-bit data, encrypted intermediate value ROUND-IN, ADD-KEY, SBOX-IN and SBOX-OUT each one byte [-1,1] encoded 32-bit data; middle The layer is 3 fully connected layers with a width of 128, and the neuron activation function is tanh; the output layer is a fully connected layer with a width of 8 neurons, and the neuron activation function is tanh. The energy consumption combination value fitting network GENet is a convolutional upgrading network. The input layer size is 10000, which is used to input all energy consumption samples generated by the SBOX0 encryption process; 5 convolutional blocks are used, and each convolutional block contains a 1D convolutional layer with a stride of 2 and a 1D stride of A max pooling laye...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of cryptographic algorithm analysis and detection, and discloses a learning side channel attack method for automatically discovering a leakage model and encryption equipment. A neural network of an attack model is trained, a combination form of an intermediate combination value of leakage key information and a corresponding energy consumption combination form are searched. The training target is to maximize the correlation between the intermediate combination value and the energy consumption combination value; in the attack stage, the attack model is used for identifying the correctness of guessed sub-keys; and the master key of the encryption equipment is recovered according to the sub-key obtained by the attack. In an attack stage, an attack data set of an unknown key is used, guess sub-keys are input into an attack model, and a vector distance between a corresponding guess middle combination value and an energy consumption combination value is calculated. The guessed sub-key with the minimum distance is selected as a correct sub-key, the sub-keys are obtained one by one by adopting a divide-and-conquer principle, and back calculation is performed on the master key to attack the master key of the encryption equipment.

Description

technical field [0001] The invention belongs to the technical field of cryptographic algorithm analysis and detection, and in particular relates to a learned side-channel attack method and an encryption device for automatically discovering leaked models. Background technique [0002] At present, encryption algorithm is the key means to ensure data security. Modern encryption algorithms are theoretically unbreakable or the cost of cracking is too high, which makes cracking the key impractical. However, side-channel attacks pose very serious challenges to the security of various encryption algorithms, so that the authentication of various encryption devices must pass the verification of side-channel attacks. The idea of ​​side-channel attack is: the energy consumption generated by the calculation operation and access operation of an intermediate value in the encryption calculation process is related to the value of the intermediate value, so the intermediate value can be iden...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F21/60G06N3/04G06N3/08
CPCG06F21/556G06F21/554G06F21/602G06N3/084G06N3/044G06N3/045
Inventor 杜之波
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products