Unlock instant, AI-driven research and patent intelligence for your innovation.

Encryption/decryption device and power analysis defense method thereof

一种加解密、功率的技术,应用在加解密领域,能够解决破解等问题,达到降低电力消耗的效果

Active Publication Date: 2017-10-31
WINBOND ELECTRONICS CORP
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Encryption and decryption algorithms are widely used in wireless communication systems such as wireless local area networks, near-field communications, and data storage systems and banking systems, but there are also malicious means of cracking them

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption/decryption device and power analysis defense method thereof
  • Encryption/decryption device and power analysis defense method thereof
  • Encryption/decryption device and power analysis defense method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] First please refer to figure 1 , figure 1 A schematic diagram showing an encryption and decryption device according to an embodiment of the present invention. In this embodiment, the encryption and decryption device 100 may be, for example, a cryptographic chip, including a data encryption and decryption unit 110 , a random number generator 120 and a power analysis defense circuit 130 . When the digital data D1 is input to the encryption and decryption device 100 , the data encryption and decryption unit 110 can receive the digital data D1 and perform encryption and decryption operations on the digital data D1 . The encryption and decryption operations here are, for example, operations conforming to encryption standards such as Data Encryption Standard (DES), 3-DES, or Advanced Encryption Standard (AES). The data encryption and decryption unit 110 generates a power signal SP1 during the encryption and decryption operation.

[0036] for example, figure 2 A schematic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an encryption / decryption device and a power analysis defense method thereof. The encryption / decryption device is suitable for performing encryption / decryption operation on the digital data, and comprises a data encryption / decryption unit, a random number generator and a power analysis defense circuit; the data encryption / decryption unit receives the digital data and performs the encryption / decryption operation on the digital data; the random number generator is used for producing the random number data, the random number data has N bits, and N is the positive integer; the power analysis defense circuit produces M power signals with different sizes according to each data in the random data when receiving the random data, and M is N-th power of the 2. The encryption / decryption device disclosed by the invention can effectively defense the power analysis attack, and cannot influence the speed and the efficiency f the encryption / decryption operation.

Description

technical field [0001] The invention relates to an encryption and decryption technology, in particular to an encryption and decryption device capable of defending against a power analysis attack (poweranalysis attack) and a power analysis defense method thereof. Background technique [0002] Encryption and decryption techniques are often used to confirm the security of information transmission. In general encryption technology, firstly, a message (ie, plain text) is encrypted (encrypted) at a transmitting end, and a message (ie, cipher text (cipher text)) is decrypted (decrypted) at a receiving end. ) or decoded. Encryption or decryption of information like this is known as encryption and decryption techniques. [0003] Encryption and decryption algorithms are widely used in wireless communication systems such as wireless local area networks, near field communications, and data storage systems and banking systems, but there are also malicious methods to crack them. Side-c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/08G06F21/75G06F21/77
CPCG06F21/75G06F21/77H04L9/003H04L9/0869H04L9/0618H04L9/0662G06F21/755H04L9/12G06F21/602G06F21/72
Inventor 游钧元锺思齐李嵩声张锡嘉李镇宜
Owner WINBOND ELECTRONICS CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More