Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An AES Mask Encryption Method Against High-Order Power Analysis

A technology of power consumption analysis and encryption method, which is applied in the field of information security, can solve the problem that the AES algorithm cannot resist high-order differential power consumption analysis, etc.

Active Publication Date: 2021-08-03
日照市财金大数据有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide an AES mask encryption method that is resistant to high-order power consumption analysis, so as to solve the problem that the AES algorithm cannot resist high-order differential power consumption analysis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An AES Mask Encryption Method Against High-Order Power Analysis
  • An AES Mask Encryption Method Against High-Order Power Analysis
  • An AES Mask Encryption Method Against High-Order Power Analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The following are specific embodiments of the present invention, and further clearly and completely describe the technical solutions of the present invention in conjunction with the accompanying drawings.

[0033] Most of the AES symmetric encryption algorithm is a linear operation, and the energy consumption is relatively uniform, but the S-box inversion nonlinear operation hardware consumes a lot of energy, which is prone to leakage of data information. Based on the Ishai-Sahai-Wagner provable security framework, the invention solves the security problem of zero-value attack in the AES algorithm protected by the one-factor multiplication mask scheme, and further designs a high-order mask scheme for protecting the AES S-box inverse nonlinear operation. It mainly includes the following steps (involving specific values, all expressed in hexadecimal form):

[0034] Step 1, initialization of higher-order masking schemes for S-box inverse nonlinear operations:

[0035] (1)...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an AES mask encryption method against high-order power consumption analysis, which belongs to the technical field of information security, namely the design of a mask protection scheme against high-order differential power consumption analysis. The present invention uses masking technology to design a protection scheme, so that the AES algorithm can resist high-order differential power consumption analysis, mainly including the following steps: Step 1, design and generate random number expressions based on the Ishai-Sahai-Wagner provable security framework; Step 2, Improve Akkar's first factorial masking scheme to protect the AES encryption algorithm, which has a security problem of zero-value attack, and design a high-level mask protection scheme to protect the AES algorithm. Using the random number generated in step 1, the energy consumption of the protection AES encryption algorithm is relatively large The S-box nonlinear operation. The AES encryption algorithm with high security and high efficiency designed by the invention is more suitable for the embedded environment with limited resources.

Description

technical field [0001] The invention relates to the AES symmetric encryption technology in the technical field of information security, in particular to an AES symmetric mask encryption algorithm realization technology considering side channel security, and the method can resist high-order differential power consumption analysis. Background technique [0002] With the development of information technology, information technology has had a huge impact on people's life and work, and it has also brought information security issues. Cryptographic algorithm is an effective means of protecting information security, but the continuous development of integrated circuits has enabled the large-scale application of embedded systems. Therefore, it is far from enough to conduct mathematical research on the hardware implementation of cryptographic algorithms. Data is stored in the process of There is a possibility of being attacked. [0003] Power consumption analysis exploits the correl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L9/06H04L9/08
CPCH04L9/003H04L9/0631H04L9/0869
Inventor 韩牟王运文马世典万爱兰华蕾
Owner 日照市财金大数据有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products