A password mask method to enhance the anti-attack ability

An anti-attack and cryptographic technology, applied in the field of cryptographic algorithms of Feistel structure, to achieve the effect of enhancing anti-differential power attack, saving hardware resources, and simple logic control

Active Publication Date: 2015-12-30
SHANDONG HUAYI MICRO ELECTRONICS
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Currently, there are currently existing Feistel-based password Mask algorithms with masks, some of which only add masks in the first and last two rounds, and the data in the middle round is still the same as the value of the original algorithm; The horizontal XOR processing of the left and right parts, or the vertical XOR processing of the front and rear wheels can eliminate the mask

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A password mask method to enhance the anti-attack ability
  • A password mask method to enhance the anti-attack ability
  • A password mask method to enhance the anti-attack ability

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to facilitate those skilled in the art to better understand the present invention, the present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments. The following is only exemplary and does not limit the protection scope of the present invention.

[0033] Taking the DES encryption algorithm of Feistel structure as an example, the present invention will be further described in detail in conjunction with the accompanying drawings.

[0034] A password Mask method for enhancing anti-attack capability, the password Mask includes an encryption process and a decryption process, the encryption process is to mask the plaintext and the data generated in its operation, and the decryption process is to mask the ciphertext and the data generated in its operation The data is masked. In this embodiment, the DES operation is taken as an example, and the encryption process, such as image 3 As shown, first u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention is a cryptographic Mask method that enhances the anti-attack capability. The encryption process includes steps: (1) introducing the original random number X, XORing the plaintext M; (2) performing an initial IP replacement, and then dividing it into two parts, L and R, And introduce the random numbers Xy and Xz generated in the middle; (3) Introduce the F function corrected by the mask, and perform n rounds of F function operations; (4) Merge the two parts of L and R, and then perform FP inverse initial replacement; (5) Introduce the original random number X, perform XOR, and get the ciphertext C. In the whole process of encryption and decryption, the present invention only uses two kinds of F-functions corrected by the mask to achieve the effect of different masks in the calculation results of adjacent rounds. The present invention only needs to realize two kinds of SM-Boxes, and Compared with other anti-CPA attack solutions, on the basis of greatly enhancing the ability to resist differential power consumption attacks and related power consumption attacks, it can also save a lot of hardware resources and reduce costs.

Description

technical field [0001] The invention relates to a cryptographic Mask method for enhancing the anti-attack ability, which is suitable for the cryptographic algorithm of Feistel structure. Background technique [0002] With the rapid development of information technology, the value of information becomes higher and higher. Correspondingly, the protection of this part of information assets is becoming more and more important. At present, the commonly used measures are software methods, but due to the proliferation of network viruses, the continuous occurrence of hacker incidents and the frequent exposure of security holes in the operating system, people have gradually lost confidence in software-based security measures. [0003] Hardware has gradually played a vital role in security systems. The basic consideration is that hardware, especially integrated circuits, has an inherently high level of security. Since the integrated circuit integrates a large number of circuits, it...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06
Inventor 王明宇邓波韩英
Owner SHANDONG HUAYI MICRO ELECTRONICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products