DES (data encryption standard) encryption method of resisting differential power analysis based on random offset

A technology of differential power analysis and encryption method, which is applied in the direction of encryption devices with shift registers/memory, etc., and can solve problems such as aligning power consumption curves, difficulty for attackers, and difficulty in blinding

Inactive Publication Date: 2012-05-09
SHANGHAI HUAHONG INTEGRATED CIRCUIT
View PDF4 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The common method to resist differential power analysis is the blinding scheme, but due to the characteristics of the DES algorithm itself, that is, the existence of nonlinear Sbox, it is difficult to completely blind it
The anti-attack method proposed in the present invention is to make it difficult for the attacker to align the power consumption curve in the time domain, so that it is impossible to implement differential power consumption analysis for DES encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • DES (data encryption standard) encryption method of resisting differential power analysis based on random offset
  • DES (data encryption standard) encryption method of resisting differential power analysis based on random offset
  • DES (data encryption standard) encryption method of resisting differential power analysis based on random offset

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] see figure 1 and figure 2 , the present invention provides an embodiment of a DES encryption method based on random offset and anti-differential power consumption analysis.

[0024] The DES encryption operation in Embodiment 1 calculates the round function every 8 clock cycles. The round function mainly includes a permutation operation and 8 Sbox operations. The permutation operation is calculated in the first and last clock cycle of the round function, and one Sbox operation is calculated in each clock cycle. The calculation sequence of the Sbox operation is determined by a random number. The entire encryption or decryption needs to calculate 16 rounds of functions, so a total of 128 clock cycles are needed to complete the DES operation. In addition, due to the need to insert fake DES to cover up the running position of the real DES, it is also necessary to add the calculation time of the fake DES. Therefore, the attacker will not be able to determine the operation...

Embodiment 2

[0034] see image 3 and Figure 4 , the present invention provides another embodiment of a random offset-based anti-differential power analysis DES encryption method.

[0035] The DES encryption operation in Embodiment 2 calculates the round function every 8 clock cycles. The round function mainly includes a permutation operation and 8 Sbox operations. The permutation operation is calculated in the first and last clock cycle of the round function, and one Sbox operation is calculated in each clock cycle. The calculation sequence of the Sbox operation is determined by a random number. The entire encryption or decryption needs to calculate 16 rounds of functions, so a total of 128 clock cycles are needed to complete the DES operation. In addition, due to the need to insert fake DES to cover up the running position of the real DES, it is also necessary to add the calculation time of the fake DES. Therefore, the attacker will not be able to determine the operation position and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a DES (data encryption standard) encryption method of resisting differential power analysis based on random offset, the method is as follows: offsetting the DES (data encryption standard) operation according to the random number in the time domain, inserting false DES (data encryption standard) operation, and making the power curves of the real DES (data encryption standard) and false DES (data encryption standard) difficult to distinguish, so that the attacker cannot find the real DES (data encryption standard) running position. In addition, it can also change the order of the DES (data encryption standard) neutron calculation and sub function, making an attacker incapable to determine the operational position. During the differential power analysis, the attacker is unable to align DES (data encryption standard) power curve which requires statistical analysis in the time domain, unable to accumulate a large number of power differences of samples to have the final statistical analysis. The invention of the method is capable of resisting differential power analysis.

Description

technical field [0001] The invention relates to an information encryption method, in particular to a DES encryption method requiring anti-differential power analysis (DPA), in particular to a random offset-based anti-differential power analysis DES encryption method. Background technique [0002] In recent years, side-channel attacks on cryptographic algorithms have attracted more and more attention and research. Side Channel Attacks (SCA) use the non-intentional information leaked when the algorithm is running in the circuit to analyze the secret data in the algorithm circuit. Power consumption analysis is currently the most popular and widely researched type of side-channel attack. Attacks are carried out by monitoring physical information such as current and voltage leaked by encryption systems. According to the attack methods, power analysis can be mainly divided into two types: Simple Power Analysis (SPA) and Differential Power Analysis (DPA), which are aimed at differ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
Inventor 柴佳晶
Owner SHANGHAI HUAHONG INTEGRATED CIRCUIT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products