A sm4 method against energy analysis attack

A technology of energy analysis attack and mask, applied in the direction of encryption device with shift register/memory, etc., can solve problems such as catastrophic impact, and achieve the effect of improving security

Active Publication Date: 2017-10-10
SHANGHAI AISINOCHIP ELECTRONICS TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, if a system that stores personal password information is compromised, the impact would be catastrophic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A sm4 method against energy analysis attack
  • A sm4 method against energy analysis attack
  • A sm4 method against energy analysis attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0091] based on the following Figure 1 ~ Figure 3 , specifically describe the preferred embodiment of the present invention.

[0092] The SM4 algorithm is a grouping algorithm, which is a generalized Feistel structure, and its only nonlinear transformation is the S-box transformation.

[0093] The present invention provides an SM4 method capable of resisting energy analysis attacks. The method uses a first-order mask key expansion engine to perform a key expansion operation on an input key, and then outputs a round key to a second-order mask encryption and decryption engine. The second-order mask encryption and decryption engine performs 32 rounds of iterative operations on the input plain (cipher) text and round key, and then outputs the secret (plain) text.

[0094] The first-order mask key expansion engine and the second-order mask encryption and decryption engine work at the same time. The first-order mask key expansion engine generates a round key each round, and output...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An SM4 method that can resist energy analysis attacks. The first-order mask key expansion engine performs key expansion operations on the input key, and outputs the round key to the second-order mask encryption and decryption engine. The second-order mask encryption and decryption engine After performing 32 rounds of iterative operations on the input plain (cipher) text and round key, the cipher (plain) text is output. The present invention uses a second-order mask to implement the encryption and decryption engine of SM4, and at the same time uses a first-order mask to implement the key expansion engine of the SM4 algorithm, which can not only resist the high-order energy analysis attack in the encryption and decryption process, but also resist the The template attack in the key expansion process effectively improves the security of SM4 algorithm hardware implementation.

Description

technical field [0001] The invention relates to the technical field of information security chip design, in particular to an SM4 method capable of resisting energy analysis attacks. Background technique [0002] In the 1990s, the Internet and mobile communications began to flourish, and the wave of informatization quickly swept through people's clothing, food, housing, transportation and other aspects. Information technology is revolutionizing the way of life and thinking of human beings with a blowout impact. For example, online shopping, which has gradually become popular in recent years, enables people to purchase commodities from all over the world without leaving home; mobile payment allows people to complete small and fast payments through mobile payment platforms and enjoy the convenience anytime, anywhere; in 2013 The popular WeChat red envelope, while shortening the distance between people, also profoundly affects the traditional financial industry. [0003] The d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06
Inventor 周玉洁朱念好
Owner SHANGHAI AISINOCHIP ELECTRONICS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products