Unlock instant, AI-driven research and patent intelligence for your innovation.

An AES Symmetrical Complementary Hardware Implementation Method Against Energy Analysis Attack

An energy analysis attack, hardware implementation technology, applied in electrical components, encryption devices with shift registers/memory, transmission systems, etc., can solve the problem of staying in theory, not applying chips on a large scale, consuming a lot of time and energy problem, to achieve the effect that is easy to achieve

Inactive Publication Date: 2017-07-14
SHANGHAI JIAOTONG UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are many difficulties in the design of WDDL circuits, so that WDDL is only theoretical and has not been applied to mass production of chips on a large scale.
With WDDL circuits, the rear-end layout and routing must be done manually, which will consume a lot of time and energy
Without the support of mature EDA software, it is an important reason why WDDL circuits cannot be mass-produced

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An AES Symmetrical Complementary Hardware Implementation Method Against Energy Analysis Attack
  • An AES Symmetrical Complementary Hardware Implementation Method Against Energy Analysis Attack
  • An AES Symmetrical Complementary Hardware Implementation Method Against Energy Analysis Attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Below in conjunction with embodiment and accompanying drawing, the present invention is described in detail, present embodiment implements under the premise of technical solution of the present invention, has provided detailed embodiment and specific operation process, but protection scope of the present invention is not limited to Examples described below.

[0028] figure 1 It is the hardware implementation scheme of AES and complementary CAES in the present invention, the existence of complementarity between AES and CAES, the initial input of AES and CAES is complementary to the sub-key logic of each round of operation, and the internal operation is completely complementary, ensuring that the AES engine and CAES The Hamming proportion of any variable in the engine is the same as the Hamming distance, thereby achieving a dynamic balance of energy. In detail:

[0029] 1. AES initial input DIN and CAES initial input Logically, it is completely complementary and serve...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An AES symmetric complementary hardware implementation method for resisting power analysis attack comprises the steps that an initial value which is fully complementary with AES initial input logic is set; an initial value which is fully complementary with AES each-round sub-key logic is set; Addkey operation is performed; Subbyte operation is performed; Shiftrow operation is peformed; Mixcolumn operation is performed. According to the method, it is guaranteed that intermediate variable Hamming proportions of each round are equal, and it is guaranteed that the intermediate variable Hamming distance between any two rounds is always zero; The method, for resisting the power analysis attack, implemented on the basis of the RTL level is convenient to implement, complementary logic gate logic does not need to be customized, no influence is exerted on the wiring layout of a backend, and no consideration needs to be given to the physical problems of load balancing, wire interconnection and the like.

Description

technical field [0001] The invention belongs to the technical field of information security chip design, and specifically relates to an AES symmetrical complementary hardware implementation method for resisting energy analysis attacks, which is widely used in highly secure encryption computing equipment. Background technique [0002] With the continuous popularization of the network and the increasing degree of social informatization, the importance of information security has gradually become prominent. As one of the most powerful weapons in information security, encryption is playing an important role. The Advanced Encryption Standard (hereinafter abbreviated as AES) encryption algorithm has experienced a long-term test since it became an advanced encryption standard until today. [0003] Any security product or cryptographic system must face a problem of how to defend against attacks and snooping. In recent years, a new powerful attack method has emerged, which is called...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L29/06
Inventor 朱念好周玉洁刘红明
Owner SHANGHAI JIAOTONG UNIV