Data Bus Encryption Method Based on XOR Address

A bus encryption and data bus technology, applied in the field of data bus encryption based on address XOR, can solve the problem of inability to change the value of plaintext data, and achieve the effect of fast computing time, increasing difficulty, and resisting physical attacks

Active Publication Date: 2019-01-22
SHANGHAI HUAHONG INTEGRATED CIRCUIT
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Another problem is that permutation cannot change the value of the plaintext data, so if the plaintext data happens to be "all 0" or "all 1", then the ciphertext data will be equal to the plaintext data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data Bus Encryption Method Based on XOR Address
  • Data Bus Encryption Method Based on XOR Address

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The data bus encryption method based on the XOR of the address is to make it difficult for an attacker to calculate the key by analyzing the ciphertext data in the memory so as to recover the plaintext. Each bit of the XOR key corresponding to the memory data is obtained by performing an XOR operation on a corresponding bit of the bus encryption key and a certain bit or bits of the memory address bus. Therefore, the XOR bus encryption keys corresponding to the data in different memory addresses are all different. Even if the plaintext data in different addresses are consistent, the ciphertext addresses obtained after the bus encryption operation are also different. This greatly increases the difficulty for an attacker to infer the correlation of plaintext data by observing the correlation of ciphertext data. In addition, even if the plaintext data happens to be "all 0" or "all 1", what is exposed to the attacker is only the bus encryption key XORed with the address. W...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an address XOR based data bus encryption method. A bus encryption key after XOR is obtained by performing XOR operation on each bit of the bus encryption key with a certain bit or multiple bits of a memory address bus. Cryptograph data is obtained by performing XOR on the bus encryption key after address XOR with memory plaintext data. XOR keys corresponding to plaintext data in each address are different, and thus attackers cannot restore plaintexts easily by reckoning the keys through analyzing the cryptograph data. The method provided by the invention can fend off physical attacks of memory data, effectively improve the system security and also substantially improves the computation speed.

Description

technical field [0001] The invention relates to the field of information encryption, in particular to a data bus encryption method based on address XOR. Background technique [0002] In recent years, physical attacks on smart card memory have attracted more and more attention and research. Sensitive data, such as keys and information related to user privacy, are often stored in the memory of the smart card. Physical attacks against memory use various means to obtain these sensitive information. Physical attack first needs to remove the chip package, and then peel off the chip layer by layer by physical or chemical means. For non-volatile memory (ROM), the data in the memory can be obtained directly through methods such as reverse engineering, image recognition, and coloring. In addition, for all types of memory, including non-volatile memory (ROM) and volatile memory (RAM), an attacker can obtain data transmitted on the bus by probing the bus with a probe. When the data ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/06H04L29/06
CPCY02D30/50
Inventor 柴佳晶徐云秀包斯刚何玉明
Owner SHANGHAI HUAHONG INTEGRATED CIRCUIT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products