A byte replacement circuit for power consumption attack prevention

A byte replacement and anti-power consumption technology, applied in electrical components, digital transmission systems, encryption devices with shift registers/memory, etc., can solve problems such as high cost, increased hardware implementation cost, and cost

Inactive Publication Date: 2007-08-01
HUAZHONG UNIV OF SCI & TECH
View PDF1 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of the above method is that the implementation is more complicated and the cost is higher
If a special circuit logic implementation form is adopted, the basic logic gate circuit needs to add some additional circuits to balance power consumption, so that there will be a loss in area and power consumption; other special logic forms are not compatible with existing chip technology Compatible with layout library, so design and production need to pay extra cost
On the other hand, if masking technology is used, a random number generator, additional masking logic and recovery logic need to be added to the chip, which will increase the cost of AES hardware implementation and reduce performance.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A byte replacement circuit for power consumption attack prevention
  • A byte replacement circuit for power consumption attack prevention
  • A byte replacement circuit for power consumption attack prevention

Examples

Experimental program
Comparison scheme
Effect test

example

[0041] As shown in Figure 5, the encoding unit 1 selects the lower 16 bits of the round data and adds them bit by bit to obtain a random number output. S-boxes S1-S16 adopt the five S-box structures and arrangement sequences shown in Figure 6 above. As mentioned above, when the random number output by the encoding unit 1 is 4, the first group of 8-bit data is input to the random switch unit 2, shifted to the right by 4 times and enters S5, and enters the recovery unit 4 after completing the byte replacement transformation, and then circulates Shift left 4 times, restore to the 8bit data processed by the first group. Similarly, the 2nd group, the 3rd group, ..., the 16th group of input data will be operated in a similar process. At this time, the encoding unit 1 is an adder structure, the random switch unit 2 is a 17-input and 16-output circular right-shift structure, and the recovery unit 4 is a 17-input and 16-output circular left-shift structure.

[0042] Compared with the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a byte alternative circuit of anti power consumption attack that includes coding unit, random switching unit, S-box unit, and recovery unit. The S-box unit consists of 4-16 isomerous S-boxes. The invention adopts isomerous S-box unit to replace the traditional signal S-box, the switching unit is inserted in the input end of S-box unit, and the recovery unit is added behind the output end. When it is been attracting, the invention can select according to the input data of attack, and no need the additional random number generator. On the other hand, the method which adds the number of random plaintext is invalid for the circuit which is provided by the invention. The invention don't need to apply the special circuit and logical mode, and can be compatible with the presexisting AES enciphering circuit. The invention can improve the anti power consumption attack greatly with less expense, and it can cover the key when the hardware of AES is encrypting and decrypting to make the power attack not get the correct key.

Description

technical field [0001] The invention belongs to the field of digital integrated circuits, and specifically relates to a byte replacement circuit resistant to power consumption attacks. The byte replacement circuit is specially used to implement the AES (Advanced Data Encryption Standard) algorithm, and is especially suitable for smart cards that may be attacked by power consumption , electronic key chips and wireless sensors and other hardware products. Background technique [0002] On October 2, 2000, the National Institute of Standards and Technology (NIST) officially announced the selection of the Rijndael algorithm as the new Advanced Encryption Standard AES (Advanced Encryption Standard) to replace the old data encryption standard DES (Data Encryption Standard). AES is designed as an encryption algorithm with strong security performance and can support various small devices. As the successor of DES, AES has been used as the de facto encryption standard by industry, ban...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/10
Inventor 刘政林邹雪城陈毅成刘菊
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products