Unlock instant, AI-driven research and patent intelligence for your innovation.

A latch PUF-based anti-side channel attack DES protection method and circuit

A technology for side-channel attacks and protection circuits, applied in the field of information security, can solve problems such as limited resources and poor computing power, and achieve the effect of reducing information leakage

Active Publication Date: 2020-08-04
SOUTHEAST UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the common problems of poor computing power and limited resources in such entities, there are great obstacles in the application of traditional cryptography-based authentication methods.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A latch PUF-based anti-side channel attack DES protection method and circuit
  • A latch PUF-based anti-side channel attack DES protection method and circuit
  • A latch PUF-based anti-side channel attack DES protection method and circuit

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Embodiments of the invention are described in detail below, examples of which are illustrated in the accompanying drawings. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0032] The present invention is based on the research of side-channel attacks aimed at DES, protects the traditional DES encryption algorithm from side-channel attacks, and performs a mask operation on the intermediate values ​​stored in key registers in the DES encryption algorithm, so that the power consumption of these registers leaks The correlation between information such as , electromagnetic and other information and the encryption key is significantly reduced, and the attacker only relies on the plaintext, ciphertext, and leaked power consumption information to recover the encryption key.

[0033] On the premise of not affecting the encryption result, the DES enc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anti-side-channel-attack DES protection method and circuit based on a Latch PUF. The method specifically comprises the steps of generating initial parameters, two-dimensional auxiliary replacement vectors and one-dimensional auxiliary replacement tables, and carrying out DES mask preparation, mask S box replacement, mask release and mask post-operation. The circuit comprises a DES basic module, a true random number generator (TRNG) based on the Latch PUF, a two-dimensional auxiliary replacement table P based on an ROM (Read Only Memory), S1 to S8 boxes based on the ROM, one-dimensional auxiliary replacement tables T1 to T8 based on an RAM (Random Access Memory), an initialization module, a mask S box replacement module, a circulation counter and a mask release module. According to the method and the circuit, various side-channel leakage information in a DES encryption process can be greatly reduced, so that an attacker is difficult to correctly obtain a secret key used when a DES is encrypted.

Description

technical field [0001] The invention relates to a Latch PUF-based anti-side channel attack DES protection method and circuit, belonging to the technical field of information security. Background technique [0002] In the information society, cryptographic technology is used in all aspects of people, and is often used to provide confidential information, that is, to protect transmitted and stored information. Cryptography technology can also be used for message signature, identity authentication, system control, information source, etc. It is an important technology related to the development and progress of human society. While cryptography has been developed, the corresponding cryptanalysis has also made great progress. In reality, the design security of a cryptographic algorithm is not limited to the security of the algorithm itself, but also includes the security of its physical entity—the cryptographic chip. When the cryptographic chip is working, a lot of additional i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L9/00H04L9/32
CPCH04L9/002H04L9/0625H04L9/3278
Inventor 李冰王凯陈帅沈克强董乾张林王刚赵霞刘勇
Owner SOUTHEAST UNIV