Cipher algorithm anti-power consumption analysis realization method and device

A cryptographic algorithm and anti-power consumption technology, applied in the field of cryptography, can solve problems such as power consumption analysis, and achieve the effect of improving security and computing efficiency

Inactive Publication Date: 2016-07-20
SHENZHEN ZHENGTONG ELECTRONICS
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of the present invention is to propose a method and device for implementing anti-power consumption analysis of a cryptographic algorithm, improve the existing anti-power consumption analysis logic, and aim to solve the problem that the SM4 cryptographic algorithm in the prior art is vulnerable to power consumption analysis. question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cipher algorithm anti-power consumption analysis realization method and device
  • Cipher algorithm anti-power consumption analysis realization method and device
  • Cipher algorithm anti-power consumption analysis realization method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0064] As an implementation manner, the above step S20 includes:

[0065] Step S21, adding anti-power consumption analysis logic in the S-box of the SM4 algorithm.

[0066] Specifically, after mapping the modular inversion operation in the SM4 encryption algorithm into a corresponding lookup table and saving it, the encryption device adds anti-power consumption analysis logic in the S-box of the SM4 algorithm.

[0067] Among them, such as figure 2 As shown, in the specific implementation, the following methods can be adopted:

[0068] 1. The encryption device performs a multiplication operation: (XM)*M, and the result is X*MM 2 ;

[0069] 2. The encryption device performs XOR operation: (X*MM 2 ) M 2 , get the result X*M;

[0070] 3. The encryption device performs the modulo inverse operation: (X*M) -1 , get the result X -1 *M -1 ;

[0071] 4. The encryption device performs XOR operation: (X -1 *M -1 )1, get the result X -1 *M -1 1;

[0072] 5. The encryption d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a cipher algorithm anti-power consumption analysis realization method and device. The method comprises the steps of mapping the modular inversion in a SM4 cipher algorithm into a corresponding lookup table, and saving; adding the preset anti-power consumption analysis logic in an S box of the SM4 cipher algorithm, adding the preset calculation logic in a round function of the SM4 cipher algorithm, and encrypting data according to the lookup table. According to the present invention, the safety problem in the prior art that the SM4 cipher algorithm can be carried out the power consumption analysis easily is solved, the operation efficiency of the finite field modular inversion in the SM4 cipher algorithm is improved, at the same time, the safety of the SM4 cipher algorithm is improved.

Description

technical field [0001] The present invention relates to the technical field of cryptography, in particular to a method and device for realizing anti-power consumption analysis of a cipher algorithm. Background technique [0002] The SM4 cipher algorithm is the first commercial cipher officially announced by our country, which is of great significance to the formulation and promotion of our country's cipher algorithm standards and cryptography research. Since the publication of the SM4 cryptographic algorithm, various researches on it have been gradually carried out, including cryptographic analysis of the SM4 cryptographic algorithm, software and hardware design and implementation, and attack and defense. [0003] The non-linear operation of the S-box in the SM4 cryptographic algorithm can be performed within GF(2 8 ) and GF(2) on two different finite fields, the S-box operation on the finite fields consists of two affine transformations and a modular inverse operation. Am...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/06
CPCH04L9/003H04L9/0631
Inventor 余思洋朱文楚
Owner SHENZHEN ZHENGTONG ELECTRONICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products