Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Implementation method and device of security sbox

An implementation method and security technology, applied in the direction of encryption device with shift register/memory, etc., can solve problems such as high cost, and achieve the effect of simplifying combinational logic circuits

Active Publication Date: 2017-09-12
SHANGHAI FUDAN MICROELECTRONICS GROUP
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when there is no fixed operation relationship between the input and output of the security SBOX (Data Encryption Algorithm, DES), the value storage of the security SBOX needs to be calculated in advance according to different random numbers before each encryption and decryption. In the memory, the lookup table is used to obtain the required value in the process of encryption and decryption. Obviously, this method needs to use an additional clock to recreate the table when the random number is different each time, and store it, which is expensive.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method and device of security sbox
  • Implementation method and device of security sbox
  • Implementation method and device of security sbox

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the above objects, features and advantages of the present invention more comprehensible, specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0030] figure 1 It is a flow chart of the implementation method of the security SBOX in the embodiment of the present invention. Such as figure 1 As shown, the method includes steps S101-S105.

[0031] First, step S101 is executed to calculate the security SBOX according to the initial SBOX, and the calculation function of the number whose ordinal number is i in the security SBOX is about the ordinal number i, the input variable A and the output variable F of the initial SBOX ( The first function G(i, A, F(A)) of A). Taking the DES encryption algorithm as an example, the initial SBOX of the general DES encryption algorithm is 8. The 8 security SBOXs corresponding to the 8 initial SBOXs may be calculated one by one according to the firs...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a security SBOX implementation method and device, the method includes: receiving the input data of the security SBOX, the input data of the security SBOX includes the masked data B and the corresponding masked random number R1, wherein, the calculation function of the number whose ordinal number is i in the security SBOX is the first function G(i, A, F) about the ordinal number i, the input variable A and the output variable F(A) of the initial SBOX (A)); Calculate the output data of the security SBOX according to the input data of the security SBOX, the security SBOX and the second function P(G(i), i, B, R1, R2), wherein, The second function P(G(i), i, B, R1, R2)=F(A, G(i), i)△R2, F(A, G(i), i) is the first The inverse transformation of a function, B=A△R1, R2 is any random number, and △ is a mask operation. The method not only does not need to recreate the table according to different mask random numbers, but also simplifies the combinational logic circuit used for calculation.

Description

technical field [0001] The invention relates to symmetric encryption technology, in particular to a method and device for realizing a secure SBOX. Background technique [0002] Symmetric cryptosystems are currently widely used, which makes the design security of symmetric cryptosystems highly valued. The core module in the symmetric cryptosystem is SBOX (substitution box), therefore, the secure SBOX implementation is particularly important. [0003] In addition, in the security cryptographic system, the input data of the secure SBOX is mainly the data that uses random numbers to hide the data, that is, the data processed by the masking technology. For example, the original data is x, and the random data m is added, and the The raw data mask is Thereby ensuring the security of the system. Moreover, in order to defend against high-level side-channel attacks, the random numbers used in each round of encryption and decryption are different. [0004] There are two implementa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06
Inventor 胡永波郭丽敏郑业扬魏长征张志敏俞军
Owner SHANGHAI FUDAN MICROELECTRONICS GROUP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products