RC4 hardware circuit mark protection method and system

A hardware circuit and protection system technology, applied in the RC4 hardware circuit mask protection method and system field, can solve the problems that the RC4 software encryption method cannot meet daily needs, etc.

Inactive Publication Date: 2017-02-15
TSINGHUA UNIV
View PDF1 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] With the popularity of computer networks, the traditional RC4 software encryption method h

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RC4 hardware circuit mark protection method and system
  • RC4 hardware circuit mark protection method and system
  • RC4 hardware circuit mark protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The implementation of the present invention will be described in detail below in conjunction with the accompanying drawings and examples, so as to fully understand and implement the process of how to apply technical means to solve technical problems and achieve technical effects in the present invention. It should be noted that, as long as there is no conflict, each embodiment and each feature in each embodiment of the present invention can be combined with each other, and the formed technical solutions are all within the protection scope of the present invention.

[0050] Traditional attacks on ciphers are all from a mathematical point of view, using mathematical theoretical analysis to find a way to crack the algorithm. The information relied on includes plaintext input and ciphertext output, but it does not consider the occasion where the cryptographic algorithm operates. In actual use, the implementation of cryptographic algorithms must rely on a certain hardware or ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a RC4 hardware circuit mark protection method and system. The method comprises: the secret key inputting and S box grouping step: performing grouping with the same number of the inputted secret keys and the S boxes, introducing random numbers to the inputted secret keys and the S boxes at the same time, wherein the inputted secret keys and the S boxes are subjected to grouping, the sum of each part is the same as the content of the inputted secret keys and the S boxes which don't have protection; the S box initial permutation step: performing initial permutation of the grouping S boxes according to the grouping inputted secret keys; and the secret key stream generation step: performing permutation once again of the grouping S boxes after the initial permutation, and taking the sum of the grouping S boxes after the permutation once again as a new index, wherein the content of the X boxes pointed by the new index is an output secret key stream. Through adoption of the algorithm level defensive measure, the RC4 hardware circuit mark protection method and system quote random numbers to take as masks to resist to the power consumption attack, especially the template attack aiming at the RC4.

Description

technical field [0001] The invention belongs to the technical field of cryptographic algorithm protection, and in particular relates to an RC4 hardware circuit mask protection method and system. Background technique [0002] In today's world, the computer network represented by the Internet has been rapidly developed and widely used, and e-commerce, e-government, and e-finance based on the computer network are booming. Therefore, network security and information security have become issues of concern to people. Many encryption algorithms are also born. Among them, RC4 has been widely used in security modules in many fields because of its easy implementation, fast encryption speed, good randomness and ability to resist various analysis. [0003] In the internationally renowned security protocol standard SSL / TLS (Secure Socket Protocol / Transport Layer Security Protocol), the RC4 algorithm is used to protect the confidentiality of Internet transmission. In the WEP protocol as...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06
CPCH04L9/065
Inventor 乌力吉张绍辉张向民
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products