Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cryptographic algorithm realization protecting method used for defending energy analysis attacks

An energy analysis attack and cryptographic algorithm technology, applied in the protection of cryptographic algorithms for defense against energy analysis attacks, and the protection of cryptographic algorithms, which can solve problems such as large time and space overhead, high design and deployment costs, and application difficulties.

Inactive Publication Date: 2012-07-11
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF3 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, the implementation of masking technology requires a large time and space overhead, which is unrealistic for resource-constrained application environments
However, some more efficient hardware countermeasures, such as dual-rail precharge logic (Dual-rail Precharge Logic), have high design and deployment costs and difficulties in application.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cryptographic algorithm realization protecting method used for defending energy analysis attacks
  • Cryptographic algorithm realization protecting method used for defending energy analysis attacks
  • Cryptographic algorithm realization protecting method used for defending energy analysis attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] In the specific application of this defense method, abnormal data may be encountered, that is, data that does not conform to the coding rules, and this situation becomes an abnormal situation. It corresponds to the normal situation. The specific implementation of the defended method is introduced for the normal situation and the abnormal situation respectively.

[0073] normal circumstances

[0074]This defense measure provides protection for the intermediate value of the cryptographic algorithm, and protects all or part of the intermediate value in the operation process according to the security requirements. For example, under low security requirements, only the intermediate values ​​of the first several rounds and the last several rounds of the algorithm can be protected, and the remaining intermediate values ​​are not protected. Under higher security requirements, the intermediate value of each round of the algorithm can be protected. The defense method encodes t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cryptographic algorithm realization protecting method used for defending energy analysis attacks, and belongs to the field of information technology safety. According to the method, intermediate values of a cryptographic algorithm are protected through adding proper encoding and decoding steps to an execution process of the cryptographic algorithm. The method comprises the steps that firstly, before the algorithm, all data participating in the operation, including plain texts, secret keys and possible initial vectors, are encoded; afterwards, in the running process of the algorithm, cryptographic computing is conducted by using the encoded data and corresponding operations according to the steps of the cryptographic algorithm, so as to complete the encryption-decryption process; and finally, after the algorithm is finished, encoded result data are decoded, and normal output of the algorithm is obtained. The method has the advantages that only the intermediate values of the cryptographic algorithm are encoded, so as to guarantee that information is not leaked by the intermediate values; the input and the output of the algorithm are not changed, so that a running result of the algorithm is guaranteed to be accurate; and meanwhile, safety performance higher than that of a mask defense measure can be obtained, and the performance cost is lower.

Description

technical field [0001] The invention relates to a protection method for implementing a cryptographic algorithm, in particular to a protection method for implementing a cryptographic algorithm for defending against energy analysis attacks, and belongs to the field of information technology security. Background technique [0002] Energy analysis attack is a new method of cryptanalysis. Energy analysis attacks use the correlation between the energy consumption of cryptographic equipment to perform cryptographic operations and the operations performed by the equipment or the data processed to implement password cracking. It has the characteristics of low attack cost and high cracking efficiency. It has already attacked smart cards, RFID, etc. The security of embedded cryptographic devices poses serious real-world threats. Lightweight block ciphers are a class of block ciphers that are widely used in resource-constrained environments. The biggest feature of lightweight block ci...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
Inventor 韩阳周永彬刘继业
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products