AES mask encryption method resisting high order power consumption analysis

A technology of power consumption analysis and encryption method, which is applied in the field of information security, can solve the problems that the AES algorithm cannot resist high-order differential power consumption analysis, etc.

Active Publication Date: 2017-08-18
日照市财金大数据有限公司
View PDF1 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide an AES mask encryption method that is resistant to high-order power co...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • AES mask encryption method resisting high order power consumption analysis
  • AES mask encryption method resisting high order power consumption analysis
  • AES mask encryption method resisting high order power consumption analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The following are specific embodiments of the present invention, and further clearly and completely describe the technical solutions of the present invention in conjunction with the accompanying drawings.

[0033] Most of the AES symmetric encryption algorithm is a linear operation, and the energy consumption is relatively uniform, but the S-box inversion nonlinear operation hardware consumes a lot of energy, which is prone to leakage of data information. Based on the Ishai-Sahai-Wagner provable security framework, the invention solves the security problem of zero-value attack in the AES algorithm protected by the one-factor multiplication mask scheme, and further designs a high-order mask scheme for protecting the AES S-box inverse nonlinear operation. It mainly includes the following steps (involving specific values, all expressed in hexadecimal form):

[0034] Step 1, initialization of higher-order masking schemes for S-box inverse nonlinear operations:

[0035] (1)...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses an AES mask encryption method resisting high order power consumption analysis, that is, design of a mask protection solution resisting high order differential power consumption analysis, belonging to the technical field of information security. The present invention uses a mask technology design protection solution, so that the AES algorithm can resist high order differential power consumption analysis. The method mainly comprises the following steps of firstly, designing and generating a random number expression according to an Ishai-Sahai-Wagner provable security frame; and secondly, solving a security problem of zero attack in a one order multiplication mask solution provided by Akkar and used for protecting an AES password algorithm, designing a high order mask protection solution protecting the AES algorithm, and protecting, by using the random number generated in the first step, an S box non-linear operation with high energy consumption in protecting AES password algorithm. The AES password algorithm with high security and efficiency is more suited to an embedded environment with limited resources.

Description

technical field [0001] The invention relates to the AES symmetric encryption technology in the technical field of information security, in particular to an AES symmetric mask encryption algorithm realization technology considering side channel security, and the method can resist high-order differential power consumption analysis. Background technique [0002] With the development of information technology, information technology has had a huge impact on people's life and work, and it has also brought information security issues. Cryptographic algorithm is an effective means of protecting information security, but the continuous development of integrated circuits has enabled the large-scale application of embedded systems. Therefore, it is far from enough to conduct mathematical research on the hardware implementation of cryptographic algorithms. Data is stored in the process of There is a possibility of being attacked. [0003] Power consumption analysis exploits the correl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04L9/06H04L9/08
CPCH04L9/003H04L9/0631H04L9/0869
Inventor 韩牟王运文马世典万爱兰华蕾
Owner 日照市财金大数据有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products