SM4 method capable of resisting energy analysis attack

An energy analysis attack and masking technology, applied in the direction of encryption devices with shift registers/memory, etc., can solve problems such as catastrophic effects, and achieve the effect of improving security

Active Publication Date: 2015-02-04
SHANGHAI AISINOCHIP ELECTRONICS TECH
View PDF3 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, if a system that stores personal password information is compromised, the impact would be catastrophic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SM4 method capable of resisting energy analysis attack
  • SM4 method capable of resisting energy analysis attack
  • SM4 method capable of resisting energy analysis attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0099] based on the following Figure 1 ~ Figure 3 , specifically explain the preferred embodiment of the present invention.

[0100] The SM4 algorithm is a grouping algorithm, which is a generalized Feistel structure, and its only nonlinear transformation is the S-box transformation.

[0101] The present invention provides an SM4 method capable of resisting energy analysis attacks. The method uses a first-order mask key expansion engine to perform a key expansion operation on an input key, and then outputs a round key to a second-order mask encryption and decryption engine. The second-order mask encryption and decryption engine performs 32 rounds of iterative operations on the input plain (cipher) text and round key, and then outputs the secret (plain) text.

[0102] The first-order mask key expansion engine and the second-order mask encryption and decryption engine work at the same time. The first-order mask key expansion engine generates a round key each round, and outputs...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an SM4 method capable of resisting energy analysis attack. The method comprises the following steps: carrying out secret key expansion operation on an input secret key by a first-order mask secret key expansion engine, outputting a round key to a second-order mask encryption / decryption engine, carrying out 32-round loop iteration operation on input plaintext / ciphertext and the round key by the second-order mask encryption / decryption engine, and outputting the plaintext / ciphertext. According to the SM4 method, the encryption / decryption engine for SM4 is realized by use of a second-order mask, the secret key expansion engine for the SM4 algorithm is realized by use of a first-order mask, the method can be used for resisting the high-order energy analysis attack in an encryption / decryption process, resisting template attack in a secrete key expansion process, and effectively improving the hardware implementation safety of the SM4 algorithm.

Description

technical field [0001] The invention relates to the technical field of information security chip design, in particular to an SM4 method capable of resisting energy analysis attacks. Background technique [0002] In the 1990s, the Internet and mobile communications began to flourish, and the wave of informatization quickly swept through people's clothing, food, housing, transportation and other aspects. Information technology is revolutionizing the way of life and thinking of human beings with a blowout impact. For example, online shopping, which has gradually become popular in recent years, enables people to purchase commodities from all over the world without leaving home; mobile payment allows people to complete small and fast payments through mobile payment platforms and enjoy the convenience anytime, anywhere; in 2013 The popular WeChat red envelope, while shortening the distance between people, also profoundly affects the traditional financial industry. [0003] The d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
Inventor 周玉洁朱念好
Owner SHANGHAI AISINOCHIP ELECTRONICS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products