Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A method and device for resisting energy attack of des algorithm

An algorithm and energy technology, applied in the field of information security, can solve the problems of leaking password information, not considering the characteristics of multiple iterations of block ciphers, and being unable to effectively resist power consumption attacks, etc., to achieve the effect of resisting energy attacks

Active Publication Date: 2017-12-29
STATE GRID CORP OF CHINA +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the process of realizing the present invention, the inventors found that there are at least the following problems in the prior art: the above-mentioned method does not consider the characteristics of multiple iterations of the block cipher, and the masked intermediate value will still leak the password information after XOR, which cannot effectively Anti-power attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for resisting energy attack of des algorithm
  • A method and device for resisting energy attack of des algorithm
  • A method and device for resisting energy attack of des algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0061] In Embodiment 1, different modified S-boxes are used in the first and second rounds of DES calculations, the same modified S-boxes are used in the 3rd to 14th rounds of DES calculations, and different modified S-boxes are used in the 15th and 16th rounds of DES calculations; The random number generator randomly generates three masks, which are 32bit mask X1, 32bit mask X2 and 32bit mask X3. In Embodiment 1, only the first round key is masked, and the rest of the subkeys are not masked. The specific algorithm flow is as follows.

[0062] The first round of DES algorithm in the first embodiment:

[0063] see Figure 4 As shown, firstly, the E-box expansion replacement is performed on the 32-bit mask X1, and the 32-bit mask X1 is expanded into a 48-bit mask E(X1), and then the XOR operation is performed on the subkey K1 and the mask E(X1) , to get the submask key K1', namely

[0064]

[0065] The sub-mask key K1' replaces the sub-key K1 in the original DES algorithm,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for resisting energy attacks of a DES algorithm, wherein the method includes: performing XOR operation on the first round key and the first mask; The mask determines the corrected S box in the first round and replaces the original S box in the first round; the second half of the input data in the first round is XORed with the second mask, and the result of the XOR operation is the first half of the output data in the first round part; the 2nd to 16th rounds replace the original S box with the same or different modified S boxes, each round determines the modified S box according to the mask of the round key belt and the mask of the second half of the round input data, and the rest of the algorithm flow The algorithm flow is the same as that of the first round; the XOR operation is performed on the output of the 16th round after the inverse initial permutation and the modified mask, and the result of the XOR operation is the output ciphertext. Through the DES algorithm anti-energy attack method provided by the invention, the energy attack can be effectively resisted.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and device for resisting energy attacks of a DES algorithm. Background technique [0002] With the development of computer technology and the continuous improvement of social informatization, information security issues are more and more widely reproduced by people. Encryption, as a powerful weapon in information security, is playing an important role. Various encryption algorithms are constantly emerging. The DES algorithm has experienced long-term tests since it became the encryption standard in the 1970s to today. [0003] In addition to analyzing the cryptographic algorithm itself, a new and powerful attack method has emerged in recent years, which is called side channel attack (Side Channel Attack). Side-channel attack refers to the attack and analysis of the cryptographic system by the attacker using the bypass information leaked during the operation ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06
Inventor 于艳艳李娜胡晓波张茜歌甘杰
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products