Unlock instant, AI-driven research and patent intelligence for your innovation.

Algorithm of encrypted chip with anti-attack advanced encryption standard

An advanced encryption standard and encryption chip technology, applied in the field of information security, can solve the problems of incomplete design software, troublesome application of asynchronous circuits, and difficult power analysis and attack methods.

Inactive Publication Date: 2008-06-11
SHANGHAI AISINOCHIP ELECTRONICS TECH
View PDF0 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Use the noise generator to generate random noise and add it to the signal terminal that may be attacked to reduce the signal-to-noise ratio of power analysis, thus making the attack method of power analysis more difficult
However, there are some defects in this method, and the attacker can complete the attack on the hardware through more sampling and signal processing.
Due to its advantages in average power consumption, peak energy signal, and electromagnetic radiation, asynchronous circuits also play a role in resisting power consumption analysis, but because asynchronous circuits themselves are not widely used in chip design, related design software It is not very complete, which brings a lot of trouble to the application of asynchronous circuits in security chips

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Algorithm of encrypted chip with anti-attack advanced encryption standard
  • Algorithm of encrypted chip with anti-attack advanced encryption standard
  • Algorithm of encrypted chip with anti-attack advanced encryption standard

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The embodiments of the present invention will be described in further detail below in conjunction with the accompanying drawings, but the present embodiments are not intended to limit the present invention, and all similar algorithms and similar changes of the present invention should be included in the protection scope of the present invention.

[0032]The invention is an encryption algorithm of a high-speed encryption chip which adopts an advanced encryption standard AES algorithm to prevent bypass attacks. The so-called attack prevention refers to a kind of DPA in SCA. The designed chip not only adopts the standard algorithm AES of NIST to prevent DPA attacks, but also has the characteristics of high speed. Encryption operations can be performed on messages of any length, and the key used is 128bits.

[0033] The design of the present invention only involves the encryption core part, and does not include the interface module. The external interface of the chip has ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an arithmetic of encryption chips preventing attacking advanced encryption standards, which relates to the technology field of information security. The mechanism of the arithmetic is that the intermediate data to be used by DPA are covered through exclusive or operation of input initial data and one random number; the key of the Masking lies in that all the data in the middle are revised by the data can be finally restored and output. Therefore, the design needs two data channels, one is used for normal encryption processing of necessary revised encrypted data and the other is used for processing of random number to restore and output real data in the two channels by simple exclusive-or at last. The invention has the characteristics of relative safety, easy realization, no statistic analysis rules and final restoration of output data.

Description

technical field [0001] The invention relates to information security technology, in particular to an algorithm technology for an anti-attack advanced encryption standard AES encryption chip. Background technique [0002] With the development of integrated circuit analysis technology, the security of chips, especially security chips themselves, is increasingly threatened. How to effectively protect the integrity, confidentiality and validity of important or sensitive data in security chips is related to the national economic, political, cultural and military aspects. Due to the particularity of the security chip, the country generally cannot obtain the internationally advanced security chip and its related technologies, of course, including the defense attack and analysis technology for the security chip. In order to enhance the security of the national security chip itself, it is very important to independently research high-performance algorithms and new circuit structures...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00H04L9/30G06F21/72
Inventor 周玉洁陈志敏秦晗谭咏伟
Owner SHANGHAI AISINOCHIP ELECTRONICS TECH