Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for defensing zero power consumption attack on code device

A zero-value power consumption attack and device technology, applied in the direction of encryption device with shift register/memory, etc., can solve the problems of reducing area and computational complexity, the effect is not obvious, and the computational complexity is large, and achieves good resistance. The effect of zero-value power attack performance, area overhead, and circuit speed reasonable

Active Publication Date: 2013-03-27
NINGBO UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0024] However, since the above-mentioned inversion algorithm on the GF(256) field needs to perform additive shielding on all data in the operation process, its computational complexity is huge
From formula (8) ~ formula (10), it can be seen that the computational complexity of the inversion algorithm based on GF(256) field is mainly concentrated on the multiplication operation on the GF(16) field. The improved algorithm proposed in literature [10] reduces the GF (16) The number of multiplication operations on the field is to increase the cost of a square operation to achieve the purpose of reducing the area and computational complexity, but the effect is not obvious

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for defensing zero power consumption attack on code device
  • Method for defensing zero power consumption attack on code device
  • Method for defensing zero power consumption attack on code device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0058] A method for defending against zero-value power consumption attacks on a cryptographic device, characterized in that GF(2 8 ) The inverse operation on the finite field uses GF(2 8 ) field additive masking inversion operation replacement, the specific process is as follows:

[0059] First in GF(2 8 ) on the finite field to perform the inverse operation, and use the superscript -1 to represent the inverse operation, specifically:

[0060] GF(2 8 ) signal data y on the domain is defined as {y 7 ,y 6 ,y 5 ,y 4 ,y 3 ,y 2 ,y 1 ,y 0}, where y i (0≤i≤7) is converted from decimal y to 8-bit binary coefficient corresponding to the i-th bit;

[0061] GF(2 4 ) signal data a on the domain is defined as {a 3 ,a 2 ,a 1 ,a 0}, where a i (0≤i≤3) is the coefficient corresponding to the i-th bit when the decimal a is converted into a 4-...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for defensing zero power consumption attack on a code device. The method is characterized in that inverse operation on a GF (28) finite field in a byte replacing module is replaced with GF (28) field additivity shielding inverse operation. The specific process is that inverse operation is first conducted on the GF (28) finite field, then the GF (28) field additivity shielding inverse operation is conducted, and a simpler GF (256) field additivity shielding inverse algorithm is provided by adopting a key module multiplexing method on the base that the traditional improved advanced encryption standard is analyzed. The method has the advantages of maintaining good zero power consumption attack resistance, being reasonable in area expense and circuit speed and capable of being widely applied to coprocessors and fields with high requirements for area, speed and security.

Description

technical field [0001] The invention relates to a method for defending against differential power consumption attacks on a cryptographic device, in particular to a method for defending against zero-value power consumption attacks on a cryptographic device. Background technique [0002] Differential Power Attack (DPA) is an efficient and low-cost cryptanalysis method, which poses a major threat to the security of cryptographic devices [1-4] . In order to defend against differential power attacks, in recent years people have adopted multiplicative shielding technology [5] In the encryption process, another variable that is not related to the actual processing data is introduced, so that the correlation between the power consumption information leaked by the cryptographic device and the actual processing data is greatly reduced, and the defense against differential power consumption attacks is achieved at the expense of chip overhead and speed. the goal of. However, the Adva...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06
Inventor 汪鹏君郝李鹏
Owner NINGBO UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products