Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Software mask defense scheme capable of preventing attack on advanced encryption standard (AES) algorithm based on power analysis

A technology of power consumption analysis and masking, which is applied in the field of information security, can solve the problem that attackers cannot obtain the AES key and reduce the cost of protection, so as to resist high-order differential power consumption attacks, reduce efficiency loss, and prevent high-order Effects of Differential Attacks

Inactive Publication Date: 2014-05-14
CHONGQING UNIV
View PDF2 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] Purpose of the invention: Aiming at the problems and deficiencies in the prior art, the present invention provides a software mask protection scheme to prevent attacks on the AES algorithm based on power consumption analysis, which can prevent power consumption attacks on the AES algorithm implemented by software in the smart card, especially The current mainstream correlation coefficient power consumption attack prevents the attacker from obtaining the AES key through this analysis method, thereby obtaining the sensitive information inside the smart card; at the same time, the design of the scheme also fully considers the encryption efficiency, and adopts the queue update mode to reduce the protection. cost;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software mask defense scheme capable of preventing attack on advanced encryption standard (AES) algorithm based on power analysis
  • Software mask defense scheme capable of preventing attack on advanced encryption standard (AES) algorithm based on power analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In the following, the specific implementation of the present invention will be described by taking the software implementation of the AES algorithm and the mask setting performed in each operation as examples. It should be understood that this embodiment is only used to illustrate the present invention and is not intended to limit the scope of the present invention, and modifications to various equivalent forms of the present invention by those skilled in the art all fall within the scope defined by the appended claims of the present application.

[0022] Because the encryption system in the smart card is implemented by software, and any intermediate value in the software-implemented encryption system has a step of storing registers in the calculation process, so all calculation intermediate values ​​are potential attack points. Therefore, unlike hardware mask protection schemes, in order to resist first-order DPA and higher-order DPA, any meta-operation in the ope...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a software mask defense scheme capable of preventing attack on advanced encryption standard (AES) algorithm based on power analysis. The software mask defense scheme comprises steps of introducing a mask matrix M, and arranging three random mask defense points in each round of encryption operation; protecting the three mask defense points through a group of mask sequences generating M during each encryption; arranging a counter C in a crypto chip, superposing original values for each encryption, and finishing construction of the matrix M when the superposed value reaches the threshold value T1; when the superposed value reaches the threshold value T2, rearranging the counter C, updating the matrix M, and repeating the step over and over again. The three random mask defense points can perform mask defense on an important intermediate value calculated at least when few of subkeys are exhausted, therefore, high-order difference power attack can be effectively defended, and security of AES secret keys are protected. Furthermore, the mask matrix is updated through a queue mode, therefore, replacement frequency of random masks is reduced, and defense cost is reduced.

Description

technical field [0001] The invention relates to a software mask protection scheme for preventing attacks on AES algorithms based on power consumption analysis, in particular to a software mask protection scheme for preventing attacks on AES algorithms based on power consumption analysis, which can prevent smart cards from being attacked by an asymmetric random mask matrix. The power consumption attack of the AES algorithm implemented by the software in the medium, which improves the protection efficiency, belongs to the field of information security. Background technique [0002] Advanced Encryption Standard (AES), also known as Rijndael encryption method, is an encryption algorithm adopted by the US federal government. This standard is used to replace the original DES. It is by far the most widely used and popular in the world. A symmetric encryption algorithm. Although many encryption chips in China still use the DES algorithm, with the gradual popularization of sma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
Inventor 徐佩姬晨刘自强张瑜李思遥傅鹂向宏陈京浩
Owner CHONGQING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products