Protection method for side channel attack and fault attack
A technology of side channel attack and fault attack, applied in secure communication device, encryption device with shift register/memory, digital transmission system, etc. To achieve the effect of easy implementation, reduction of additional resources, and strong security
Active Publication Date: 2014-03-12
STATE GRID CORP OF CHINA +4
4 Cites 18 Cited by
AI-Extracted Technical Summary
Problems solved by technology
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreMethod used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreAbstract
The invention provides a protection method for side channel attack and fault attack. The protection method comprises the following steps of I. dividing operation of block cipher algorithm into a plurality of stages of pipelines; II. inputting real plaintext into two stages of pipelines selected at random, and inputting random number into other stages of pipelines; III. carrying out operation, and then comparing whether the operation results of the two real data are consistent after the operation is finished. The protection method can resist both side channel attack and fault attack, and has strong safety and high execution efficiency.
Application Domain
Technology Topic
Side channel attackPlaintext +3
Image
Examples
- Experimental program(1)
Example Embodiment
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more Similar technology patents
A buried cable with a reserved branch port and a manufacturing method thereof
ActiveCN109102928AEasy injection moldingStrong securityInsulated cablesReduction of cables/conductors sizeElectrical and Electronics engineeringInjection moulding
Owner:安徽扬子线缆有限公司
Impact testing machine for deck chair handrail
Owner:SHANGHAI UNIV
Risk avoiding table and chair
Owner:南京天稻智慧教育科技研究院有限公司
Classification and recommendation of technical efficacy words
- Strong security
- Improve execution efficiency
Method for using and revoking authentication information and blockchain-based server using the same
ActiveUS20170330180A1Strong securityEffective usabilityCryptography processingDigital data authenticationRevocationBlockchain
Owner:COINPLUG LNC
System and method for user authentication interface
ActiveUS7188314B2Enormous combinatorial capacityStrong securityDigital data processing detailsUser identity/authority verificationUser authenticationOrder set
Owner:AUTHERNATIVE INC
Method for preparing graphene by chemical oxidation reduction
Owner:SICHUAN UNIV
System and method for two-factor user authentication
ActiveUS20130185779A1Strong securityMinimize costDigital data processing detailsMultiple digital computer combinationsUser authenticationReduced risk
Owner:CSE CO LTD
An embedded information security platform
InactiveCN1622517ALow costStrong securityData switching networksSecuring communicationSerial digital interfaceApplication Context
Owner:上海极毅信息科技有限公司