Hardware 3DES for using digital power consumption compensation to prevent from power consumption power attack

A technology of power consumption attack and 3DES-1, which is applied in the field of smart cards, can solve problems such as power consumption attacks and hidden dangers, and achieve the effect of preventing power consumption attacks

Inactive Publication Date: 2008-03-26
BEIJING CEC HUADA ELECTRONIC DESIGN CO LTD
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Power consumption attacks make many encryption algorithms that are proved to b

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware 3DES for using digital power consumption compensation to prevent from power consumption power attack
  • Hardware 3DES for using digital power consumption compensation to prevent from power consumption power attack
  • Hardware 3DES for using digital power consumption compensation to prevent from power consumption power attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] Fig. 1 is the general structural diagram of the present invention. The hardware 3DES-1 module realizes high-speed 3DES encryption operation. In addition, a digital power consumption compensation circuit module 3DES-2 is designed to compensate the power consumption of the 3DES-1 module. To perform power consumption compensation, the change of power consumption of 3DES-2 should be opposite to that of 3DES-1 module, so that the sum of the two is constant, and the situation of the key cannot be analyzed from the power consumption of the chip.

[0015] After analysis, the level of a certain node in the circuit has the following four situations: A.1->0; B.0->1; C.0->0; D.1->1. Among them, the power consumption of A and B flipping cases is basically the same, and the power consumption of C and D holding cases is basically the same, but the power consumption of flipping is much greater than the power consumption of holding. To compensate for the change in power consumption in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention relates to a hardware 3DES preventing power loss attack by digital power loss compensation used in intelligent card chips of a safety applied field, which utilizes a method for digital circuit power loss compensation to design two symmetrical 3DEG hardware circuits, one for getting ciphering result and the other for compensaing power loss to a first 3DEG circuit only playing the role of a coprocessor of ciphered operation in an intellident card, which can prevent power loss attack in the intelligent card field at the same time when realizing 3DEG ciphered operation at high speed.

Description

technical field [0001] The present invention is mainly applied to smart cards in high-security application fields, such as telecommunication cards, financial cards, and social security cards, and can also be applied to various security chips that need to perform high-speed 3DES calculations and need to prevent power consumption attacks on 3DES. Background technique [0002] The National Bureau of Standards (NIST) announced an encryption algorithm developed by IBM in 1977, and approved it as a data encryption standard used by non-confidential departments, referred to as DES (Data Encryption Standard). Since its publication, it has been beyond national borders and has become the most commonly used encryption algorithm for commercial confidential communication and computer communication in the world. The key of DES is 56 bits, and the key is too short. 3DES is a variant of DES, which adopts triple encryption and extends the key of DES to 128 bits, which has higher security. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06G06F1/28G06K19/07
Inventor 郑晓光汤磊胡晓波关洪波
Owner BEIJING CEC HUADA ELECTRONIC DESIGN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products