A Defense Method for Side Channel Attack and Fault Attack

A side-channel attack and fault attack technology, which is applied to secure communication devices, encryption devices with shift registers/memory, digital transmission systems, etc., can solve the problems of being unable to resist fault attacks, occupying more resources, and low efficiency. Achieve the effect of easy implementation, reduction of additional resources, and strong security

Active Publication Date: 2017-11-07
STATE GRID CORP OF CHINA +4
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] As a method of side channel attack, power analysis can only resist power consumption attack, but cannot resist fault attack.
To be able to resist both side-channel analysis and fault attacks, the existing technology needs to add other defense methods, which will take up more resources during implementation
Moreover, in the prior art, each circle operation of the symmetric algorithm is divided into several sub-steps. Generally speaking, the symmetric algorithm will contain multiple circle operations. If each circle operation is divided into several sub-steps, the efficiency will be very high when the algorithm is running. Low, it will take many clock cycles to complete an encryption / decryption operation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Defense Method for Side Channel Attack and Fault Attack
  • A Defense Method for Side Channel Attack and Fault Attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be further described below in conjunction with accompanying drawing.

[0030] The invention provides a protection method against side channel attack and fault attack, and the method adopts pipeline technology. The method of the present invention is as follows: the operation of the block cipher algorithm is divided into several stages of pipelines, and two stages of pipelines are randomly selected, the input of the two stages of pipelines is real plaintext, and the input of other stages is random numbers.

[0031] Because at the same time, different levels of pipelines use different data to participate in the operation, and the side information generated when the random number participates in the operation is used as noise to cover up the side information generated by the real data participating in the operation, so that it can resist side channel attacks.

[0032] By comparing the operation results of the two real data at the end of the operat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a kind of protection method of side-channel attack and fault attack, and this method comprises the following steps: 1, the operation of block cipher algorithm is divided into several stages of pipelines; II, randomly select two stages of pipelines to input real plaintext, other levels The input is a random number; III, carry out the operation, when the operation is over, compare the two real data to see if the operation results are consistent. The method can resist both side-channel attack and fault attack, and has strong security and high execution efficiency.

Description

technical field [0001] The invention relates to a method in the field of smart card chips, in particular to a protection method for side channel attacks and fault attacks. Background technique [0002] With the development of computer technology and the continuous improvement of social informatization, information security issues are more and more widely reproduced by people. Encryption, as a powerful weapon in information security, is playing an important role. Various encryption algorithms are constantly emerging. Currently, the more popular block cipher algorithms include DES and AES. A block cipher algorithm is an algorithm for encrypting fixed-length plaintext. It groups the plaintext by a certain length, and encrypts the plaintext and the key to obtain the ciphertext. When decrypting, the ciphertext and key are restored to plaintext through decryption operation. [0003] With the advancement of measurement and analysis methods, various attack methods have also been ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L9/00
Inventor 于艳艳李娜胡晓波甘杰孙歆赵保华王志皓颜立
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products