Side-channel attack protection method based on full-encryption algorithm pseudo-operation

An encryption algorithm, a technology of side-channel attack, applied in encryption device with shift register/memory, key distribution, can solve the problem that side-channel attack has no effect, etc.

Active Publication Date: 2015-06-24
SHANGHAI JIAO TONG UNIV +2
View PDF12 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method is ineffective

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Side-channel attack protection method based on full-encryption algorithm pseudo-operation
  • Side-channel attack protection method based on full-encryption algorithm pseudo-operation
  • Side-channel attack protection method based on full-encryption algorithm pseudo-operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] Such as figure 1 As shown, N=m+1 in this embodiment. N and m represent the execution times of the SMS4 algorithm and the number of pseudo-keys, respectively.

[0031] The implementation device of this embodiment includes: a round function generation module based on SMS4, 1 real key storage, m false key storages, a key storage random scrambling circuit, and a periodic round key generation circuit, wherein: SMS4 The round function is connected to the periodic round key generation circuit and transmitted, the key storage is connected to the key random scrambling circuit and transmitted, and the key random scrambling circuit is connected to the periodic round key generation circuit.

[0032] The SMS4-based round function generation module is: a normal SMS4 round function.

[0033]The one real key storage is: four 32-bit registers for storing 128-bit keys.

[0034] The m pseudo-key memories are: m 32-bit registers for storing m 32-bit pseudo-keys.

[0035] The random scr...

Embodiment 2

[0043] Such as image 3 As shown, N>m in this embodiment. N and m represent the execution times of the SMS4 algorithm and the number of pseudo-keys, respectively.

[0044] The implementation device of this embodiment includes: a round function generation module based on SMS4, (m+1) key storages, a periodic round key generation circuit, and a round key random selection circuit, wherein: the round function module of SMS4 is related to the periodic The round key generating circuit is connected and transmitted, the periodic round function generating module is connected and transmitted with the key storage, and the pseudo key storage is connected and transmitted with the periodic key random selection circuit.

[0045] The random selection circuit of the key is as follows: the moment when the real key is first positioned to execute the SMS4 algorithm, and the selection of other false keys is randomly and repeatedly selected from the optional false key, and the last 96 of the real k...

Embodiment 3

[0048] Embodiment 3 is a software calling method, and the selection method of its key is the same as that of Embodiment 1.

[0049] The application scenario of Embodiment 3 is that the hardware implementation cannot be changed, and the side-channel attack protection solution with the same effect as Embodiment 1 is implemented through software calling.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a side-channel attack protection method based on full-encryption algorithm pseudo-operation in the technical field of computer security. Multiple times of SMS4 encryption calculation is conducted through a secret key sequence composed of m pseudo secret keys and a true secret key, and required ciphertext is obtained through the SMS4 encryption calculation result which the true secret key participates in. The position of generated true operation is random, an attacker can not align with a power consumption curve, and therefore attacks can not be achieved. In addition, no interference effect on side-channel attacks can be achieved when the pseudo secret keys are used, and the side-channel attacks can lose efficacy. The scheme can be achieved through a full-hardware mode or a software calling mode, and by means of the software calling method, password circuits where hardware can not be modified and side-channel attacks can not be prevented can be protected.

Description

technical field [0001] The invention relates to a technology in the field of computer security, in particular to a password circuit bypass attack protection method based on a pseudo-operation of a full encryption algorithm, which is applicable to algorithms such as SMS4. Background technique [0002] In reality, cryptographic systems are usually implemented with hardware or software in the form of hardware, such as: smart cards, RFID, cryptographic coprocessors, SoC cryptographic chips, cryptographic machines, etc. In the implementation environment of these cryptographic systems, attackers can observe and measure information such as energy consumption and electromagnetic radiation of cryptographic transformations, and it is possible to use these additional information to achieve more effective cryptographic deciphering than traditional mathematical analysis. People usually refer to the attack in this environment as "side channel attack (Side Channel Attack)". In the method ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/06
Inventor 陆海宁刘军荣陈佳超包斯刚季欣华李大为罗鹏李国友
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products