Supercharge Your Innovation With Domain-Expert AI Agents!

DES system capable of performing circulatory iteration to resist channel attack and remapping achieving SBOX method

A side-channel attack and cyclic iteration technology, applied in the field of data encryption, can solve problems such as precarious security, and achieve the effects of improving security, simplifying circuit structure, and reducing signal delay

Active Publication Date: 2015-04-29
GIANTEC SEMICON LTD
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the security of the encryption algorithm nearly 40 years ago is in jeopardy in the face of today's constantly updated attack technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • DES system capable of performing circulatory iteration to resist channel attack and remapping achieving SBOX method
  • DES system capable of performing circulatory iteration to resist channel attack and remapping achieving SBOX method
  • DES system capable of performing circulatory iteration to resist channel attack and remapping achieving SBOX method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The present invention will be further elaborated below by describing a preferred specific embodiment in detail in conjunction with the accompanying drawings.

[0056] Such as figure 1 As shown, a DES system capable of cyclic and iterative resistance to side-channel attacks, the DES system includes: a computing unit, a multi-layer computing storage unit, a data storage unit and a mask storage unit.

[0057] Wherein, the multi-layer operation storage units are connected sequentially, and each layer of operation storage units is connected with the operation unit. The data storage unit is respectively connected with the operation storage unit and the operation unit of the last layer; the mask storage unit is connected with the operation unit.

[0058] Each layer of operation storage unit includes L data storage, R data storage and K key storage; the L data storage, R data storage and K key storage of the operation storage unit of this layer are respectively connected with ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a DES system capable of performing circulatory iteration to resist channel attack and a remapping achieving SBOX method. By means of a first mask C, a second mask Cx and a processed Cx', traditional SBOX power consumption and linear correlation of Hamming weight are remapped into other correlation types when operation of a nonlinear operation function is performed, the threat of traditional side channel attack can be weakened theoretically, and the safety of DES can be improved. In addition, a part of xor operation during operation of the nonlinear operation function is simplified, the circuit area of the designed DES circuit system can be decreased, working power consumption can be reduced, and the DES system has high practicability. The DES system weakens the relation between a power consumption curve and data flipping through SBOX remapping change, and simplifies a circuit structure according to relevant parameters of the SBOX, and signal delay of circuits is decreased.

Description

technical field [0001] The invention relates to a method for realizing data encryption, in particular to a DES system capable of cyclic iteration against side channel attacks and a method for realizing remapping SBOX. Background technique [0002] Data Encryption Standard (DES for short) is a block encryption algorithm disclosed by IBM in the 1970s. Due to its good cryptographic characteristics, it is still widely used in various occasions today. However, the security of the encryption algorithm nearly 40 years ago is in jeopardy in the face of today's constantly updated attack technology. In particular, the publication of Differential Power Analysis technology in 1998 made side channel attacks a new breakthrough point. [0003] The focus of DES power consumption attack is SBOX (substitution box, non-linear substitution box) calculation. The SBOX based on the look-up table principle is the only nonlinear component in the DES operation, and it is also the part where the sta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06
Inventor 刘峥张晨刘力睿罗许喜
Owner GIANTEC SEMICON LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More