Method and device for resisting energy analysis attack in block encryption operation

An energy analysis attack and block encryption technology, which is applied in the direction of encryption devices with shift registers/memory, countermeasures for attack encryption mechanisms, and secure communication devices, can solve problems such as attack algorithm keys, and achieve increased noise and resistance. Effect of channel energy analysis attack

Active Publication Date: 2021-09-28
BEIJING SMARTCHIP MICROELECTRONICS TECH COMPANY +3
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing technology can resist the first round and the last round of attacks, but once the first round of operations is aligned, the first round of keys is successfully attacked, and then the remaining rounds of operations can be easily searched and aligned, and then attacked Algorithm key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for resisting energy analysis attack in block encryption operation
  • Method and device for resisting energy analysis attack in block encryption operation
  • Method and device for resisting energy analysis attack in block encryption operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, but it should be understood that the protection scope of the present invention is not limited by the specific embodiments.

[0027] Unless expressly stated otherwise, throughout the specification and claims, the term "comprise" or variations thereof such as "includes" or "includes" and the like will be understood to include the stated elements or constituents, and not Other elements or other components are not excluded.

[0028] Below, will combine Figure 2 to Figure 3 , to describe in detail the method for resisting energy analysis attacks in block encryption operations according to specific embodiments of the present invention. In this method, random pseudo-encryption operations are inserted between each round of block encryption operations, so that the sensitive information of the round operations is covered by noise. It will not leak, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and device for resisting energy analysis attacks in block encryption operations. The method includes generating a pseudo encryption operation, and the pseudo encryption operation uses a pseudo key for encryption; combining the real encryption operation with the pseudo encryption operation, A basic encryption operation unit is formed; a pseudo-encryption operation unit is generated, and the pseudo-encryption operation unit only includes pseudo-encryption operations; the basic encryption operation unit and the pseudo-encryption operation unit are combined to perform encryption operations. Compared with the prior art, the block encryption operation disclosed in the present invention randomly inserts pseudo-encryption operations between each round of operations to ensure that sensitive information is covered by noise. , cyclically calling such an operation unit and the input data is a random number, which can further increase noise and effectively resist side channel energy analysis attacks.

Description

technical field [0001] The invention relates to the field of security chips, in particular to a method and device for resisting energy analysis attacks in block encryption operations. Background technique [0002] With the development of computer technology, the problems of illegal duplication of computer software, leakage of communication and threats to data security are becoming more and more serious, and information security is getting more and more attention. In information security technology, encryption technology occupies an irreplaceable position, and the research and development of information encryption technology and encryption algorithm are changing with each passing day. Wherein, the block cipher algorithm is an algorithm for encrypting fixed-length plaintext. It groups the plaintext by a certain bit length, and encrypts the plaintext and the key to obtain the ciphertext. When decrypting, the ciphertext and key are restored to plaintext through decryption oper...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L9/00
CPCH04L9/003H04L9/0618
Inventor 孙静莹甘杰胡晓波于艳艳刘劲松韩月
Owner BEIJING SMARTCHIP MICROELECTRONICS TECH COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products