An AES Symmetrical Complementary Hardware Implementation Method Against Energy Analysis Attack
An energy analysis attack, hardware implementation technology, applied in electrical components, encryption devices with shift registers/memory, transmission systems, etc., can solve the problem of staying in theory, not applying chips on a large scale, consuming a lot of time and energy problem, to achieve the effect that is easy to achieve
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] Below in conjunction with embodiment and accompanying drawing, the present invention is described in detail, present embodiment implements under the premise of technical solution of the present invention, has provided detailed embodiment and specific operation process, but protection scope of the present invention is not limited to Examples described below.
[0028] figure 1 It is the hardware implementation scheme of AES and complementary CAES in the present invention, the existence of complementarity between AES and CAES, the initial input of AES and CAES is complementary to the sub-key logic of each round of operation, and the internal operation is completely complementary, ensuring that the AES engine and CAES The Hamming proportion of any variable in the engine is the same as the Hamming distance, thereby achieving a dynamic balance of energy. In detail:
[0029] 1. AES initial input DIN and CAES initial input Logically, it is completely complementary and serve...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


