Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-attack method and circuit implementation based on dynamically changing the storage location of intermediate data

An intermediate data, dynamic change technology, applied in encryption devices with shift register/memory, key distribution, can solve the problems of high power consumption, dynamic power consumption, high power consumption, etc., achieve low area cost and resist power consumption attacks , the effect of effective power attack

Active Publication Date: 2017-02-15
SOUTHEAST UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the basic circuit unit maintains a fixed state, the energy consumption of the circuit is small, and there is only a small amount of static power consumption; when the basic unit flips from "0" to "1", or from "1" to "0", the circuit The middle transistor will be turned on instantaneously, resulting in dynamic power consumption with large power consumption
It can be seen that the power consumption of digital circuits mainly comes from the state transition of the circuit, and does not depend on the data itself, and the more devices that are flipped, the greater the power consumption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-attack method and circuit implementation based on dynamically changing the storage location of intermediate data
  • Anti-attack method and circuit implementation based on dynamically changing the storage location of intermediate data
  • Anti-attack method and circuit implementation based on dynamically changing the storage location of intermediate data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] Below in conjunction with accompanying drawing and specific embodiment, further illustrate the present invention, should be understood that these embodiments are only for illustrating the present invention and are not intended to limit the scope of the present invention, after having read the present invention, those skilled in the art will understand various aspects of the present invention Modifications in equivalent forms all fall within the scope defined by the appended claims of this application.

[0051] Such as figure 1 As shown, the encryption process of DES can be divided into three stages:

[0052] 1. The 64-bit plaintext realizes the bit rearrangement of the plaintext through the initial replacement of the IP, and at the same time divides the 64-bit plaintext into L 0 and R 0 two parts. L 0 is the first 32 bits of plaintext after bit rearrangement, R 0 It is the last 32 bits of plaintext.

[0053] 2. Perform 16 rounds of iterative operations. The 16 ite...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anti-attack method based on the middle data storage position dynamic change, and circuit implementation. Obtaining of an assumed power consumption value is damaged, so that power consumption attacking is resisted; the positions of registers where DES algorithm middle data are stored are dynamically changed when the DES algorithm operates, and middle data of every two adjacent rounds are stored in different registers, so that power analysis attacking based on a hamming distance model is effectively resisted. The method is high in flexibility, small in area cost and high in power consumption attaching resistance. Meanwhile, the method has very high expansibility, can be used for resisting other potential attacking points in the algorithm, and can be well transplanted to other cryptographic algorithms. A very good solution and a very good design method are provided for designing a cryptographic chip which is high in security and capable of effectively resisting power consumption attacking.

Description

technical field [0001] The invention relates to the technical field of integrated circuit hardware implementation and information security, in particular to an anti-power consumption attack method for DES (Data Encryption Standard) cryptographic algorithm hardware circuits. Background technique [0002] With the increasing informatization, digitalization and networking of modern society, information security products represented by cryptographic equipment have penetrated into all aspects of national security and people's lives. Cryptographic products can be realized by software, but hardware-based cryptographic devices have become a research hotspot because hardware implementation has a faster speed than software implementation. Various encryption chips based on DES (Data Encryption Standard, Data Encryption Standard), AES (Advanced Encryption Standard, Advanced Encryption Standard), RSA and other algorithms have been extensively researched and developed. [0003] Cryptogra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L9/08
Inventor 单伟伟戴文韬伏星源
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products