A method and a device for constructing an overturning counting model

A model and hierarchical model technology, applied in the field of information security, can solve problems such as inability to obtain intermediate values, characterization of combined circuit power consumption leakage, etc., to achieve the effect of strong pertinence and high efficiency

Pending Publication Date: 2019-05-10
CHINA ACADEMY OF INFORMATION & COMM
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Its disadvantage is that when using the Hamming heavy model, it is considered that the power consumption generated by the encryption equipment is related to the Hamming heavy weight of the data processed
[0006] The disadvantage is that when the attacker knows the original design or a part of the continuously processed data in the netlist, the Hamming distance model

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0032] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0033] With the rapid development of information technology, the role of information security has become more and more important. One of the core technologies in the existing information security field is cryptography. From the various protocols of the computer network application layer to the various hardware devices in the communication system, cryptography plays a very important role. Existing encryption algorithms are mainly divided in

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a device for constructing an overturning counting model. The method comprises the following steps: carrying out simulation hierarchical model classification on a logic simulation tool for analyzing power consumption leakage in encryption equipment; dividing the simulation hierarchical model into a burr-free model and a burr-containing model; determining that thesimulation hierarchical model is a burr-free model, and obtaining a final simulation hierarchical model according to the simulation hierarchical model corresponding to the circuit type of the encryption equipment; Exporting the simulation data in the final simulation hierarchical model as a VCD file; and analyzing the overturning signal in the VCD file to obtain an overturning counting model. According to the method and the device for constructing the flip counting model provided by the invention, the burr information is depicted through the model hierarchy required by simulation, and the flip counting leakage model is constructed in combination with the type of the circuit of the actual encryption equipment, so that the pertinence is stronger and the efficiency is higher when the actualside channel power consumption analysis is implemented.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner CHINA ACADEMY OF INFORMATION & COMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products