AES (Advanced Encryption Standard) encryption method and power attack resisting method based on the same

An encryption method and key expansion technology, applied in the field of AES encryption and anti-power attack, can solve problems such as lack, and achieve the effect of simple logic implementation and efficient logic implementation

Active Publication Date: 2016-06-08
WUXI RES INST OF APPLIED TECH TSINGHUA UNIV
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] However, the existing methods of resisting power consumption attacks on AES are mainly designed for traditional AES implementation schemes, and there is a lack of anti power consumption attack strategies for this kind of non-column confusion and more efficient encryption implementation process.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • AES (Advanced Encryption Standard) encryption method and power attack resisting method based on the same
  • AES (Advanced Encryption Standard) encryption method and power attack resisting method based on the same
  • AES (Advanced Encryption Standard) encryption method and power attack resisting method based on the same

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0024] In describing the present invention, it should be understood that the terms "center", "longitudinal", "transverse", "upper", "lower", "front", "rear", "left", "right", " The orientations or positional relationships indicated by "vertical", "horizontal", "top", "bottom", "inner" and "outer" are based on the orientations or positional relationships shown in the drawings, and are only for the convenience of describing the present invention and Simplified descriptions, rather than indicating or implying that the device or element refe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an AES (Advanced Encryption Standard) encryption method and a power attack resisting method based on the same; the AES encryption method comprises the following steps: grouping clear data; carrying out XOR operation on an input and an expanded secret key of a round function; carrying out data replacement with an S box having an 8-bit input and a 32-bit output; shifting 32-bit data output by the S box; carrying out the XOR operation correspondingly on the 32-bit data output by row shifting operation; carrying out the XOR operation on the expanded secret key; carrying out the data replacement with the S box having the 8-bit input and the 8-bit output; carrying out the XOR operation with the expanded secret key; and outputting encrypted data. The invention has the following advantages: the operations needed by each of the steps in the encryption method only have table look-up, shifting and XOR, so the logic implementation is relatively simple and efficient; and the power attack resisting method has mixcolumn, so the power attack resisting effect is good.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an AES encryption method and an anti-power consumption attack method based on and. Background technique [0002] With the development of informatization, information security issues are becoming more and more important. People have proposed various cryptographic algorithms in this process. Among these various cryptographic algorithms, AES (Advanced Encryption Standard, Advanced Encryption Standard) is widely used all over the world. It is used and has become an internationally common symmetric encryption algorithm. With its advantages of short key establishment time, high sensitivity, and low memory requirements, it is widely used in information security fields, such as e-commerce and communication encryption. [0003] As people analyze the AES algorithm at various levels, there are many ways to attack and crack the AES algorithm. Among the many attack methods, the p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L29/06
CPCH04L9/0631H04L63/1441
Inventor 刘雷波朱敏吴有余罗凯尹首一魏少军
Owner WUXI RES INST OF APPLIED TECH TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products