Method and device for resisting energy analysis attacks in block encryption operation

An energy analysis attack and block encryption technology, which is applied in the direction of encryption devices with shift registers/memory, countermeasures for attack encryption mechanisms, and secure communication devices, can solve problems such as attack algorithm keys, and achieve increased noise and resistance. Effect of channel energy analysis attack

Active Publication Date: 2018-11-02
BEIJING SMARTCHIP MICROELECTRONICS TECH COMPANY +3
View PDF16 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing technology can resist the first round and the last round of attacks, but once the first round of operations is aligned, the first round of keys is successfully attacked, and then the remaining rounds of operations can be easily searched and aligned, and then attacked Algorithm key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for resisting energy analysis attacks in block encryption operation
  • Method and device for resisting energy analysis attacks in block encryption operation
  • Method and device for resisting energy analysis attacks in block encryption operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, but it should be understood that the protection scope of the present invention is not limited by the specific embodiments.

[0027] Unless expressly stated otherwise, throughout the specification and claims, the term "comprise" or variations thereof such as "includes" or "includes" and the like will be understood to include the stated elements or constituents, and not Other elements or other components are not excluded.

[0028] Below, will combine Figure 2 to Figure 3 , to describe in detail the method for resisting energy analysis attacks in block encryption operations according to specific embodiments of the present invention. In this method, random pseudo-encryption operations are inserted between each round of block encryption operations, so that the sensitive information of the round operations is covered by noise. It will not leak, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and device for resisting energy analysis attacks in block encryption operation. The method comprises the following steps: generating a pseudo encryption operation, andencrypting the pseudo encryption operation by adopting a pseudo key; combining a real encryption operation with the pseudo encryption operation to form a basic encryption operation unit; generating apseudo encryption operation unit, wherein the pseudo encryption operation unit only includes the pseudo encryption operation; and combining the basic encryption operation unit with the pseudo encryption operation unit to perform the encryption operation. Compared with the prior art, according to the block encryption operation disclosed by the invention, the pseudo encryption operation is randomlyinserted between every round of operations to ensure that sensitive information is covered by noises, and based on the basic operation unit after inserting the pseudo operation between each round ofoperations, the operation unit is called circularly and input data are random numbers, so that the noises can be further increased, and side channel energy analysis attacks can be effectively resisted.

Description

technical field [0001] The invention relates to the field of security chips, in particular to a method and device for resisting energy analysis attacks in block encryption operations. Background technique [0002] With the development of computer technology, the problems of illegal duplication of computer software, leakage of communication and threats to data security are becoming more and more serious, and information security is getting more and more attention. In information security technology, encryption technology occupies an irreplaceable position, and the research and development of information encryption technology and encryption algorithm are changing with each passing day. Wherein, the block cipher algorithm is an algorithm for encrypting fixed-length plaintext. It groups the plaintext by a certain bit length, and encrypts the plaintext and the key to obtain the ciphertext. When decrypting, the ciphertext and key are restored to plaintext through decryption oper...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/00
CPCH04L9/003H04L9/0618
Inventor 孙静莹甘杰胡晓波于艳艳刘劲松韩月
Owner BEIJING SMARTCHIP MICROELECTRONICS TECH COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products