Unlock instant, AI-driven research and patent intelligence for your innovation.

Energy analysis attack resistant symmetric algorithm hardware realization structure

A technology of energy analysis attack and symmetric algorithm, which is applied in the direction of attacking encryption mechanism countermeasures, electrical components, digital transmission systems, etc., can solve the problems of staying in theory, not applying chips on a large scale, consuming a lot of time and energy, and achieving The effect of solving the transmission delay effect

Inactive Publication Date: 2016-04-27
SHANGHAI AISINOCHIP ELECTRONICS TECH
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are many difficulties in the design of WDDL circuits, so that WDDL is only theoretical and has not been applied to mass production of chips on a large scale.
With WDDL circuits, the rear-end layout and routing must be done manually, which will consume a lot of time and energy
Without the support of mature EDA software, it is an important reason why WDDL circuits cannot be mass-produced

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Energy analysis attack resistant symmetric algorithm hardware realization structure
  • Energy analysis attack resistant symmetric algorithm hardware realization structure
  • Energy analysis attack resistant symmetric algorithm hardware realization structure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Below in conjunction with embodiment and accompanying drawing, the present invention is described in detail, present embodiment implements under the premise of technical solution of the present invention, has provided detailed embodiment and specific operation process, but protection scope of the present invention is not limited to Examples described below.

[0026] Such as figure 1 As shown, in the hardware implementation structure of the symmetric algorithm against energy analysis attack described in the present invention, an S-box that is completely complementary to the S-box of the symmetric algorithm is used. In the present invention, the original S-box of the symmetric algorithm is recorded as S-Box, and the complementary S-box constructed in the present invention is referred to as C-S-Box. S-Box and C-S-Box are equivalent to two mutually compensating units in WDLL logic.

[0027] In the implementation of the symmetric algorithm, S-Box and C-S-Box always have th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an energy analysis attack resistant symmetric algorithm hardware realization structure. The structure contains an original S box (S-Box) of a symmetric algorithm, a complementary S box (C-S-Box) of the symmetric algorithm, and a noise circuit for weakening an output transmission delay effect. The S-Box and the C-S-Box are equivalently two mutually compensatory units in WDLL logic, and always same inputs X and opposite outputs serve as inputs of two same register sets. According to the structure, the existence of S-Box and C-S-Box complementarity ensures that the Hamming specific gravity output by the S-Box in each round is the same as the Hamming distance, so that dynamic energy balance is achieved; and meanwhile, the introduction of a random noise source eliminates the transmission delay effect of a combination circuit and achieves the goal of resisting energy analysis attacks.

Description

technical field [0001] The invention belongs to the technical field of information security chip design, and specifically relates to a hardware implementation structure of a symmetric algorithm for resisting energy analysis attacks based on a random noise complementary S-box, which is widely used in highly secure encryption computing equipment. Background technique [0002] With the continuous popularization of the network and the increasing degree of social informatization, the importance of information security has gradually become prominent. As one of the most powerful weapons in information security, encryption is playing an important role. The symmetric algorithm based encryption is fast, easy to implement, and has gone through a long-term test. [0003] Any security product or cryptographic system must face a problem of how to defend against attacks and snooping. In recent years, a new powerful attack method has emerged, which is called Side Channel Attack (SCA). Sid...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L29/06
CPCH04L63/0435H04L9/003
Inventor 朱念好周玉洁王大永
Owner SHANGHAI AISINOCHIP ELECTRONICS TECH