Protection method for side channel attack and fault attack

A technology of side channel attack and fault attack, applied in secure communication device, encryption device with shift register/memory, digital transmission system, etc. To achieve the effect of easy implementation, reduction of additional resources, and strong security

Active Publication Date: 2014-03-12
STATE GRID CORP OF CHINA +4
View PDF4 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] As a method of side channel attack, power analysis can only resist power consumption attack, but cannot resist fault attack.
To be able to resist both side-channel analysis and fault attacks, the existing technology needs to add other defense methods, which will take up more resources during implementation
Moreover, in the prior art, each circle opera

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection method for side channel attack and fault attack
  • Protection method for side channel attack and fault attack

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0029] The present invention will be further described below in conjunction with the accompanying drawings.

[0030] The present invention provides a protection method against side channel attacks and fault attacks, which adopts pipeline technology. The method of the invention is as follows: the operation of the block cipher algorithm is divided into several stages of pipelines, and two stages of pipelines are randomly selected.

[0031] Since the pipelines of different stages at the same time are involved in the operation of different data, the side information generated when the random number participates in the operation is used as noise to mask the side information generated by the real data participating in the operation, so that it can resist side channel attacks.

[0032] By comparing whether the operation results of the two real data are consistent at the end of the operation, if they are consistent, it is considered that there is no fault attack, so that the fault att...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a protection method for side channel attack and fault attack. The protection method comprises the following steps of I. dividing operation of block cipher algorithm into a plurality of stages of pipelines; II. inputting real plaintext into two stages of pipelines selected at random, and inputting random number into other stages of pipelines; III. carrying out operation, and then comparing whether the operation results of the two real data are consistent after the operation is finished. The protection method can resist both side channel attack and fault attack, and has strong safety and high execution efficiency.

Description

technical field [0001] The invention relates to a method in the field of smart card chips, in particular to a protection method for side channel attacks and fault attacks. Background technique [0002] With the development of computer technology and the continuous improvement of social informatization, information security issues are more and more widely reproduced by people. Encryption, as a powerful weapon in information security, is playing an important role. Various encryption algorithms are constantly emerging. Currently, the more popular block cipher algorithms include DES and AES. A block cipher algorithm is an algorithm for encrypting fixed-length plaintext. It groups the plaintext by a certain length, and encrypts the plaintext and the key to obtain the ciphertext. When decrypting, the ciphertext and key are restored to plaintext through decryption operation. [0003] With the advancement of measurement and analysis methods, various attack methods have also been ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06H04L9/00
Inventor 于艳艳李娜胡晓波甘杰孙歆赵保华王志皓颜立
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products