Reconfigurable cipher processor and anti-power consumption attach method

An anti-power consumption and anti-attack technology, which is applied in the fields of electrical digital data processing, instruments, digital data authentication, etc., can solve problems such as side-channel attacks that have not yet been seen, and achieve strong anti-attack ability, low circuit overhead, and high flexibility Effect

Active Publication Date: 2012-06-20
SOUTHEAST UNIV
View PDF2 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As for reconfigurable cryptographic processors, which have become more popular in research in recent years, there have been no relevant reports on methods that can effectively resist side-channel attacks.
International and domestic research mainly focuses on the flexibility and performance of reconfigurable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Reconfigurable cipher processor and anti-power consumption attach method
  • Reconfigurable cipher processor and anti-power consumption attach method
  • Reconfigurable cipher processor and anti-power consumption attach method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment example

[0033] In a specific implementation case of a method for resisting power consumption attacks of a reconfigurable cryptographic processor, a specially designed coarse-grained reconfigurable array cryptographic processor is used, and various algorithms such as AES and DES are implemented. The following uses DES Taking the specific implementation of the algorithm as an example, the anti-attack method of the present invention is illustrated by using the differential power analysis attack based on the Hamming distance power consumption model as the attack means. According to the Hamming distance power consumption model of CMOS circuits, the total number of 0→1 transitions and 1→0 transitions of the registers in the circuit within a certain period of time is used to describe the power consumption of the circuit during this period. Therefore, for power consumption attacks, in this case, only the usage of registers in the cryptographic processor is concerned. The registers used by the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a reconfigurable cipher processor. The reconfigurable cipher processor comprises a reconfigurable array, a control circuit, a functional configuration unit and an anti-attack configuration unit, wherein the functional configuration unit is used for configuring the reconfigurable array into an operating unit and an idle unit through the control circuit; and the anti-attack configuration unit is used for making the idle unit generate random power consumption. The invention also discloses an anti-power consumption attack method implemented by means of the reconfigurable cipher processor. The reconfigurable cipher processor has the characteristics of low circuit cost, high resource utilization rate, high flexibility, high anti-attack capability, applicability to various cipher algorithms, extensibility, upgradeability and the like, can be used in related fields of information security and computer system structures, and provides new solutions for designing cipher processor chips with high security, high flexibility and moderate areas.

Description

technical field [0001] The invention relates to the technical fields of information security and integrated circuit design, in particular to a cryptographic processor realized by a reconfigurable method and a method for resisting power consumption attacks. Background technique [0002] With the increasing informatization, digitalization and networking of modern society, people's demand for information security technology is becoming more and more extensive and in-depth. Information security products have become an important guarantee for the healthy operation of the whole society. Among them, the high-performance and high-security cryptographic processor is an essential basic hardware. Various types are based on DES (Data Encryption Standard, Data Encryption Standard), AES (Advanced Encryption Standard, Advanced Encryption Standard), RSA, ECC (Elliptic Curves Cryptography) , Elliptic Curve Cryptographic Algorithm) and HASH (Hash) and other cryptographic coprocessor chips hav...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F21/45
Inventor 单伟伟田朝轩陆寅超刘新宁余云帆时龙兴
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products