Resisting method of circuit on side channel attack based on pseudo-operation

A side-channel attack and pseudo-operation technology, which is applied to encryption devices with shift registers/memory, etc., can solve the problem that side-channel attacks have no effect

Active Publication Date: 2015-06-24
SHANGHAI JIAO TONG UNIV +2
View PDF15 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method is ineffective against side channel attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Resisting method of circuit on side channel attack based on pseudo-operation
  • Resisting method of circuit on side channel attack based on pseudo-operation
  • Resisting method of circuit on side channel attack based on pseudo-operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] Such as figure 1 As shown, N=m+1 in this embodiment. N and m represent the execution times of the first round and the number of pseudo-round keys respectively.

[0029] The implementation device of this embodiment includes: a round function generation module based on SMS4, (m+1) round key storages, a periodic round key circuit, and a random random scrambling circuit for the round key storage, wherein: the first round of round function The round key storage is connected and transmitted, the round functions are connected and transmitted, and the round key storage is connected and transmitted with the round key random scrambling circuit.

[0030] The described SMS4-based round function generation module is: the normal SMS4 round function

[0031] The round key storage is: a 32-bit register for storing a 32-bit round key

[0032] The random scrambling circuit of the round key memory is as follows: put together m pseudo-round keys and a real round key, then use the random...

Embodiment 2

[0039] Such as image 3 As shown, N>m in this embodiment. N and m represent the execution times of the first round and the number of pseudo-round keys respectively.

[0040] The realization device of this embodiment includes: a round function generating module based on SMS4, (m+1) round key storages, a periodic round key circuit, and a round key random selection circuit, wherein: the first round of the round function and the round key The key storage is connected and transmitted, the round functions are connected and transmitted, and the round key storage is connected and transmitted with the round key random selection circuit.

[0041] The random selection circuit of the round key is as follows: first locate the time when the real key is executed, and select other pseudo-round keys randomly and repeatedly from the optional pseudo-round keys.

[0042] The difference between this embodiment and Embodiment 1 lies in the selection method of the round key during the first round ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a resisting method of a circuit on the side channel attack based on the pseudo-operation, and belongs to the technical field of computer security. A round secret key sequence is composed by m pseudo-round secret keys and one real-round secret key to conduct the first round SMS4 encrypting calculation, a second round SMS4 encrypting calculation is conducted on the result of the first round SMS4 encrypting calculation with the participation of the real-round secret key, and a ciphertext is acquired. According to the resisting method of the circuit on the side channel attack based on the pseudo-operation, the position of the generated first round SMS4 encrypting calculation is random, and an attacker cannot align with a power-consumption curve, so that the attack cannot be realized; in addition, compared with an unprotected circuit, the energy consumption cannot exceed the two times of the original energy consumption.

Description

technical field [0001] The invention relates to a technology in the field of computer security, in particular to a circuit bypass attack defense method based on pseudo-operation, which is applicable to algorithms such as SMS4. Background technique [0002] In reality, cryptographic systems are usually implemented with hardware or software in the form of hardware, such as: smart cards, RFID, cryptographic coprocessors, SoC cryptographic chips, cryptographic machines, etc. In the implementation environment of these cryptographic systems, attackers can observe and measure information such as energy consumption and electromagnetic radiation of cryptographic transformations, and it is possible to use these additional information to achieve more effective cryptographic deciphering than traditional mathematical analysis. People usually refer to the attack in this environment as "side channel attack (Side Channel Attack)". In the method of side channel attack, it usually includes S...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
Inventor 刘军荣王伟嘉季欣华李大为罗鹏莫凡
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products