Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security SBOX realization method and apparatus

An implementation method and security technology, applied in the direction of encryption device with shift register/memory, etc., can solve problems such as high cost, and achieve the effect of simplifying combinational logic circuits

Active Publication Date: 2014-11-19
SHANGHAI FUDAN MICROELECTRONICS GROUP
View PDF1 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when there is no fixed operation relationship between the input and output of the security SBOX (data encryption algorithm (Data Encryption Algorithm, DES)), it is necessary to calculate the value storage of the security SBOX in advance according to different random numbers before each encryption and decryption. In the memory, the lookup table is used to obtain the required value in the process of encryption and decryption. Obviously, this method needs to use an additional clock to recreate the table when the random number is different each time, and store it, which is expensive.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security SBOX realization method and apparatus
  • Security SBOX realization method and apparatus
  • Security SBOX realization method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the above objects, features and advantages of the present invention more comprehensible, specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0030] figure 1 It is a flow chart of the implementation method of the security SBOX in the embodiment of the present invention. like figure 1 As shown, the method includes steps S101-S105.

[0031] First, step S101 is executed to calculate the security SBOX according to the initial SBOX, and the calculation function of the number whose ordinal number is i in the security SBOX is about the ordinal number i, the input variable A and the output variable F of the initial SBOX ( The first function G(i, A, F(A)) of A). Taking the DES encryption algorithm as an example, the initial SBOX of the general DES encryption algorithm is 8. The 8 security SBOXs corresponding to the 8 initial SBOXs may be calculated one by one according to the first f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security SBOX realization method and apparatus. The method comprises: receiving input data of a security SBOX, wherein the input data of the security SBOX comprises data B which is subjected to mask processing and a corresponding mask randomized number R1, and the calculation function of a number, whose ordinal number is I, in the security SBOX is a first function G(i, A, F(A)) which relates to the ordinal number I, an initial SBOX input variable A and an output variable F(A); and according to the security SBOX, the input data of the security SBOX and a second function P(G(i), i, B, R1, R2), calculating the output data of the security SBOX, wherein the second function P(G(i), i, B, R1, R2)=F(A, G(i), i)delta R2, F(A, G(i), i) is inverse transformation of the first function, B=A delta R1, R2 is any one randomized number, and delta is mask operation. By use of the method provided by the invention, reformulation of a table according to different mask randomized numbers is unnecessary, and combination logic circuits for calculation is also simplified.

Description

technical field [0001] The invention relates to symmetric encryption technology, in particular to a method and device for realizing a secure SBOX. Background technique [0002] Symmetric cryptosystems are currently widely used, which makes the design security of symmetric cryptosystems highly valued. The core module in the symmetric cryptosystem is SBOX (substitution box), therefore, the secure SBOX implementation is particularly important. [0003] In addition, in the security cryptographic system, the input data of the secure SBOX is mainly the data that uses random numbers to hide the data, that is, the data processed by the masking technology. For example, the original data is x, and the random data m is added, and the The raw data mask is Thereby ensuring the security of the system. Moreover, in order to defend against high-level side-channel attacks, the random numbers used in each round of encryption and decryption are different. [0004] There are two implementa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
Inventor 胡永波郭丽敏郑业扬魏长征张志敏俞军
Owner SHANGHAI FUDAN MICROELECTRONICS GROUP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products