Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A fast protection method against timing and cache side channel attacks in Klein encrypted AVR environment

A side-channel attack and environment technology, applied in the field of cryptographic algorithms, can solve the problems that there is no anti-timing or cache boundary channel attack implementation.

Active Publication Date: 2017-01-11
SOUTH CHINA NORMAL UNIVERSITY
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the published literature and patents, there is no anti-timing or Cache boundary channel attack implementation for KLEIN

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A fast protection method against timing and cache side channel attacks in Klein encrypted AVR environment
  • A fast protection method against timing and cache side channel attacks in Klein encrypted AVR environment
  • A fast protection method against timing and cache side channel attacks in Klein encrypted AVR environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0039]This embodiment starts from the characteristics of the AVR microprocessor, and based on the AVR ASM language, provides the Bitslicing implementation level and related optimization methods of the lightweight packet encryption algorithm KLEIN for Internet of Things applications. In the process of implementation, firstly, the optimized processing method under Bitslicing is given for the ANF expression of Sbox. Secondly, corresponding optimizations are carried out based on the reading and storage operations, which reduces the computational complexity of the algorithm in the MixNibbles step, so that the KLEIN algorithm can defend against border channel attacks such as timing and cache through Bitslicing. From the actual test results on the AVR platform, the optimized KLEIN algorithm Bitslicing is practicable under the AVR microprocessor platform. Such as figure 2 As shown, in this embodiment, the protection method against high-speed anti-timing and cache under the avr envir...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a rapid protection method for resisting timing and cache side channel attack under a KLEIN encryption AVR environment. The rapid protection method comprises the following steps that S1, input 4 bits are converted into a Boolean operation equation set of output 4 bits through algebra standard form conversion; S2, bit values which are output in the S1 step are grouped according to bytes, total 8 bytes exist, and two bytes are in ring shift left and are output to a next step; S3, the output from the S2 step is subjected to bit slicing linear diffusion operation, the output is final output of a KLEIN round function and is taken as an input value of the next round S1; S4, the steps S1, S2 and S3 are repeated aiming at different KLEIN secret key lengths until a corresponding complete encryption output value is obtained. According to the rapid protection method, a Timing boundary channel attack mode, a Cache boundary channel attack mode and the like are defended by a KLEIN algorithm through a bit slicing mode; meanwhile, corresponding majorization is carried out respectively on the basis of reading and storage operations, and the computation complexity of the algorithm on a MixNibbles step is thus reduced.

Description

technical field [0001] The invention relates to the technical field of cryptographic algorithms, in particular to a fast protection method against timing and cache side channel attacks under the KLEIN encrypted AVR environment. Background technique [0002] With the continuous development of Internet of Things (Internet of Things) applications, related information security issues have also received more and more attention. Lightweight cryptography algorithms, especially lightweight block cipher algorithms, play a very important role in the security of the Internet of Things because they can ensure the confidentiality and integrity of data in a low-power environment. Due to the maturity of cryptographic algorithm analysis and design technology, traditional cryptographic analysis methods often pose little actual threat to related applications, but attackers can attack through boundary channel information generated in energy, time or storage. Often more threatening. [0003] ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06
Inventor 龚征温雅敏周志荣
Owner SOUTH CHINA NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products