Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing block cipher multiple S-boxes for resisting differential power attack

A differential power consumption attack and block cipher technology, which is applied in countermeasures against encryption mechanisms, encryption devices with shift registers/memory, digital transmission systems, etc., can solve the problem of reducing computing speed, increasing hardware consumption resources, and restricting security chips Development and other issues to achieve the effect of increasing difficulty and increasing attack difficulty

Active Publication Date: 2017-09-26
ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the above two technologies have a common disadvantage, that is, significantly increasing the resources consumed by the hardware or reducing the computing speed, which also seriously restricts the development of security chips.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing block cipher multiple S-boxes for resisting differential power attack
  • Method for realizing block cipher multiple S-boxes for resisting differential power attack
  • Method for realizing block cipher multiple S-boxes for resisting differential power attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] In order to improve the effective protection of the S box, the present invention provides a figure 1 The block cipher multi-S-box implementation method for resisting differential power consumption attacks shown above uses pipeline technology to add three-level registers in the middle of the multi-dimensional serial reusable S-box frame, so that the speed of cryptographic operations is lower than that of the original scheme. It will drop too much and improve efficiency.

[0043] Using the block cipher multi-S-box randomized input technology, the attacker of the differential power consumption attack cannot align the curve according to the relevant statistical difference method after obtaining the power consumption curve, thus resulting in the failure of the differential power consumption attack and improving the security of the block cipher implementation sex.

[0044] The specific plan includes the following steps:

[0045] Step 1: Select a block cipher algorithm, conv...

Embodiment 2

[0076] Taking the block cipher algorithm DES as an example, the present invention is further described in detail.

[0077] Although we know that the DES algorithm of the 56bit key has been proved to be insecure in many applications. But we know that Triple-DES is still widely used in the field of electronic payment, because it has a key of 112bits, so it is proved to be safe.

[0078] The DES algorithm is a symmetric cryptosystem in the cryptographic system, also known as the American Data Encryption Standard. It is a symmetric cryptosystem encryption algorithm developed by IBM Corporation in the United States in 1972. The plaintext is grouped by 64 bits, the key length is 64 bits, and the key is actually 56 bits to participate in the DES operation (the 8th, 16th, 24th, 32nd, 40th, 48th, 56th, and 64th bits are check bits, so that each key All keys have an odd number of 1) grouped plaintext groups and 56-bit keys that are replaced or exchanged bit by bit to form an encryption...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for realizing block cipher multiple S-boxes for resisting differential power attack. Firstly a plurality of parallel S-boxes are converted for obtaining 4*4 S-box replacements. Furthermore the 4*4 S-box replacements are numbered. Then block cipher multiple S-box random input technology is performed on all 4*4 S-boxes so that an attacker who performs the differential power attack cannot align a curve according to a related statistics differential method after obtaining a power consumption curve, and therefore the differential power attack fails, thereby improving safety in realizing a block cipher. Furthermore according to the method, only g(n) bits of random numbers are utilized and the random numbers are greatly reduced than that in other mask solutions. Attack difficulty in data processing of the differential power attack is greatly increased. In a speed aspect, because the original parallel S-boxes are converted to a multidimensional serial reusable S-box frame according to the method, a streamline method can be used, thereby reducing speed by 30% than an original solution.

Description

technical field [0001] The invention relates to the technical field of side channel attack and defense theory in an information security system, and in particular relates to a block cipher multi-S-box implementation method for resisting differential power consumption attacks. Background technique [0002] Differential power consumption attack is a physical attack on cryptographic chips first proposed by American expert Paul Kocher in 1999. This scheme first collects the power consumption generated by the chip when running the block cipher algorithm, and then uses the correlation between power consumption and key data to In order to recover the key, the method of statistical difference is used. Because of its advantages of high efficiency and low cost, it has brought great threats and challenges to the security of information security systems. Its related theories have been developed for nearly 20 years, and it is still a hot spot for experts to study. [0003] With the matu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06H04L9/00
CPCH04L9/003H04L9/0631
Inventor 杨晓元张帅伟张敏情钟卫东韩益亮周潭平张卓杨海滨薛帅
Owner ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products