Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Anti-power-attack method and device for DES (Data Encrypt Standard) algorithm

An algorithm and energy technology, applied in the field of information security, can solve the problems of leaking password information, not considering the characteristics of multiple iterations of block ciphers, and being unable to effectively resist power consumption attacks, etc., to achieve the effect of resisting energy attacks

Active Publication Date: 2015-05-20
STATE GRID CORP OF CHINA +1
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the process of realizing the present invention, the inventors found that there are at least the following problems in the prior art: the above-mentioned method does not consider the characteristics of multiple iterations of the block cipher, and the masked intermediate value will still leak the password information after XOR, which cannot effectively Anti-power attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-power-attack method and device for DES (Data Encrypt Standard) algorithm
  • Anti-power-attack method and device for DES (Data Encrypt Standard) algorithm
  • Anti-power-attack method and device for DES (Data Encrypt Standard) algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0061] In Embodiment 1, different modified S-boxes are used in the first and second rounds of DES calculations, the same modified S-boxes are used in the 3rd to 14th rounds of DES calculations, and different modified S-boxes are used in the 15th and 16th rounds of DES calculations; The random number generator randomly generates three masks, which are 32bit mask X1, 32bit mask X2 and 32bit mask X3. In Embodiment 1, only the first round key is masked, and the rest of the subkeys are not masked. The specific algorithm flow is as follows.

[0062] The first round of DES algorithm in the first embodiment:

[0063] see figure 2 As shown, firstly, the E-box expansion replacement is performed on the 32-bit mask X1, and the 32-bit mask X1 is expanded into a 48-bit mask E(X1), and then the XOR operation is performed on the subkey K1 and the mask E(X1) , to get the submask key K1', namely

[0064] K 1 , = ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anti-power-attack method and device for a DES (Data Encrypt Standard) algorithm. The method comprises the following steps: performing exclusive-or operation on a first-round sub-key and a first mask; determining a first-round correction S-box according to the first mask on the basis of an original first-round S-box, and substituting the original first-round S-box; performing exclusive-or operation on the back half part of first-round input data and a second mask, wherein an exclusive-or operation result is the front half part of first-round output data; in second to sixteenth rounds, substituting the original S-box with identical or different correction S-boxes, and determining a correction S-box according to a mask carried by a wheel key and a mask carried by the back half part of wheel input data in each round, wherein other algorithm flows are the same as a first-round algorithm flow; and performing exclusive-or operation on a result obtained after the execution of reverse initial permutation on sixteenth-round output, wherein the result of the exclusive-or operation is an output cipher text. Through the anti-power-attack method for the DES algorithm provided by the invention, power attacks can be effectively resisted.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and device for resisting energy attacks of a DES algorithm. Background technique [0002] With the development of computer technology and the continuous improvement of social informatization, information security issues are more and more widely reproduced by people. Encryption, as a powerful weapon in information security, is playing an important role. Various encryption algorithms are constantly emerging. The DES algorithm has experienced long-term tests since it became the encryption standard in the 1970s to today. [0003] In addition to analyzing the cryptographic algorithm itself, a new powerful attack method has emerged in recent years, which is called side channel attack (Side Channel Attack). Side-channel attack refers to the attack and analysis of the cryptographic system by the attacker using the bypass information leaked during the operation of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06
Inventor 于艳艳李娜胡晓波张茜歌甘杰
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products