Method and test circuit for preventing data encryption algorithm (DES) attack based on power analysis

A power consumption analysis and algorithm technology, applied in the direction of encryption devices with shift registers/memory, etc., can solve the problems of increasing complexity and achieve the effect of ensuring security

Inactive Publication Date: 2013-04-24
SOUTHEAST UNIV
View PDF2 Cites 44 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But this makes multiple clocks appear in a system, which gre

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and test circuit for preventing data encryption algorithm (DES) attack based on power analysis
  • Method and test circuit for preventing data encryption algorithm (DES) attack based on power analysis
  • Method and test circuit for preventing data encryption algorithm (DES) attack based on power analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Below in conjunction with specific embodiment, further illustrate the present invention, should be understood that these embodiments are only used to illustrate the present invention and are not intended to limit the scope of the present invention, after having read the present invention, those skilled in the art will understand various equivalent forms of the present invention All modifications fall within the scope defined by the appended claims of the present application.

[0026] In order to overcome the potential safety hazard caused by using the same mask between two rounds of traditional symmetric encryption, the present invention proposes a method for preventing DES algorithm attacks based on power analysis. The code value and position are different from other rounds, which makes it impossible to eliminate the effect of the mask when using the Hamming distance model. The specific process of this program is as follows figure 1 Shown, where X is a random number, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and test circuit for preventing data encryption algorithm (DES) attack based on power analysis. Before a first subkey K1 carries out operation on data, an algorithm process is kept the same with an original DES process, after xor is conducted on a plaintext through the subkey K1 in a first round, a mask off code X is led in, operation of encryption processes from a following second round to a fifteenth round is similar, only numerical values of random numbers of the xor are different, and correctness of processing procedures in the arithmetic is ensured. At last, the mask off code X on the xor is output in a sixteenth round, real ciphertext information is restored through inverse permutation between initial permutation (IP) and final permutation (FP) and a mask off code X4. According to the DES, due to the fact that values and positions of mask off codes added in the first round and the last round are different from those of other rounds, namely encryption by non symmetrical mask off codes, so that effects of the mask off codes cannot be eliminated by adoption of a hamming distance model, and therefore power attack on the DES can be prevented, and the purpose of ensuring safety of a DES secret key is achieved.

Description

technical field [0001] The invention relates to a method and a test circuit for preventing DES algorithm attacks based on power consumption analysis, in particular to a method and a circuit for preventing attacks on DES algorithms based on power consumption analysis, which can prevent attacks on DES algorithms by using asymmetric mask encryption operations. The power consumption attack of an algorithm chip belongs to the field of integrated circuit security technology. Background technique [0002] The US National Security Agency (NIST) announced an encryption algorithm developed by IBM's computer cryptography research project team in 1977, and approved it as the data encryption standard for non-confidential departments, referred to as DES. DES algorithm is by far the most widely used and popular symmetric encryption algorithm in the world. Although DES has now been replaced by the new encryption standard AES, many encryption chips in China still use the DES algorithm, whic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06
Inventor 刘波孙华芳时龙兴李杰金海坤郭银涛吕宇翔单伟伟
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products