Mask method and device for resisting power attack in SM4 algorithm
A mask and algorithm technology, applied in the field of information security, can solve the problem of ineffective resistance to differential energy attacks, and achieve the effect of resisting energy attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0045] In Embodiment 1, different random masks are introduced in the first and second rounds of SM4 operations, and the corresponding modified S boxes are also different from the modified masks; the same random masks are introduced in the 3rd to 30th rounds of SM4 operations, and the corresponding The corrected S-box is the same as the corrected mask; different random masks are introduced in the 32nd and 33rd rounds of SM4 operations, and the corresponding corrected S-box and corrected mask are also different; the random number generator randomly generates five random masks, They are 32bit random mask M1, 32bit random mask M2, 32bit random mask M3, 32bit random mask M4 and 32bit random mask M. The input 128bit plaintext X is: X=(X 0 ,X 1 ,X 2 ,X 3 ), the specific algorithm flow is as follows.
[0046] see Figure 4 As shown, a 32-bit random mask M1 is introduced in the first round, and the modified S box S1' box and the modified mask M1' of the first round are determined ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com