Encrypting method and chip for anti-attack standard encryption criterion

A technology of encryption chip and encryption method, which is applied in the field of information security

Inactive Publication Date: 2008-06-11
SHANGHAI AISINOCHIP ELECTRONICS TECH
View PDF0 Cites 46 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional DES is fragile in front of DPA, and the probability of successful attack in a complete test environment is very high. Therefore, it i

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypting method and chip for anti-attack standard encryption criterion
  • Encrypting method and chip for anti-attack standard encryption criterion
  • Encrypting method and chip for anti-attack standard encryption criterion

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0030] The embodiments of the present invention will be described in further detail below in conjunction with the accompanying drawings, but the present embodiments are not intended to limit the present invention, and all similar structures, methods and similar changes of the present invention should be included in the protection scope of the present invention.

[0031] The embodiment of the present invention is a design of a high-speed encryption chip for realizing DES algorithm against bypass attacks (especially DPA attacks)—DES_Mask IP. The designed chip not only uses NIST's standard algorithm DES to prevent DPA attacks, but also has the characteristics of high speed, which can encrypt messages of any length. The key used is 64bits (including parity bits). The whole chip is set to DES_Mask IP, and the encryption engine is set to DES_Mask. This chip (or IP) design has three cores: masking the plaintext, masking the key, and generating a new random number according to the ran...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an attack-proof DES encryption method and an encryption chip, relating to the information security technical field. The encryption chip comprises a memory interface module for the chip input and output, the data bit transformation and comprising each register and an encryption engine DES Mask of the DES decryption operation for realizing the DPA attack proof; an output signal and an input signal of the encryption engine are respectively connected to a corresponding register. The encryption method comprises the following steps that: 1) in the process of clear-text input, a uniform random number of x is used to Mask; 2) the standard DES operation is completed including the XOR operation of a round key generated by the mask of the Key of a Mask Key and the operation of the replacement of a modified S-box; 3) when the result is outputted, the calculation result of the DES is obtained when the uniform random number of x is XOR. The invention can effectively avoid the SPA attack, the DPA attack and the high-order DPA attack.

Description

technical field [0001] The invention relates to information security technology, in particular to an anti-attack DES (Standard Encryption Standard) encryption method and encryption chip technology. Background technique [0002] With the continuous popularization of the network and the increasing degree of social informatization, the importance of information security has gradually become prominent. As one of the most powerful weapons in information security, encryption is playing an important role. Currently commonly used cryptographic algorithms can be roughly divided into two categories: symmetric algorithms represented by DES (Standard Encryption Standard) and AES (Advanced Encryption Standard) and RSA (a public key encryption method) and ECC (Elliptic Curve Cryptography) as representatives. Represents an asymmetric algorithm. In data communication, symmetric encryption is widely used because of its fast encryption speed and simple implementation method. The DES encryp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06
Inventor 周玉洁陈志敏秦晗谭咏伟
Owner SHANGHAI AISINOCHIP ELECTRONICS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products