AES encryption method resisting path difference attack

An encryption method and encryption algorithm technology, applied in the countermeasures of attacking encryption mechanism, encryption device with shift register/memory, digital transmission system, etc., can solve the problem of no effective defense scheme, etc., to prevent side channel attacks , increase speed and efficiency, and eliminate the effect of path differences

Active Publication Date: 2018-12-07
UNIV OF SCI & TECH OF CHINA
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The path difference attack is a side-channel attack that attacks the AES algorithm due to the difference in the time between the round key and the round data reaching the next computing unit in each round; however, there is no comparative effective defense program

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • AES encryption method resisting path difference attack
  • AES encryption method resisting path difference attack
  • AES encryption method resisting path difference attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0021] An embodiment of the present invention provides an AES encryption method that is resistant to path difference attacks. The method calculates the round key of AES separately round by round, and then calculates the time difference between the transmission path of the round data and the transmission path of the round key. The delay unit of the time difference is added to the path of the round key transmission, so that the final transmission time...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an AES encryption method resisting path difference attack. A round key is calculated for each round, a round key path and a round data path are controlled accurately in each round so that time when the two paths reach a next calculation unit is kept consistent, path difference is eliminated, and further a side channel attack based on the path difference can be resisted; anda stream line technology in a hardware circuit is used, stream line segmentation is carried out on each round of the AES encryption method, different separated parts can work in parallel, the speed and efficiency of the whole encryption algorithm are improved greatly.

Description

technical field [0001] The invention relates to the technical field of AES encryption, in particular to an AES encryption method resistant to path difference attacks. Background technique [0002] The Advanced Encryption Standard (AES) was created by two Belgian cryptographers, Vincent Rijmen and Joan Daemen, to replace the older Data Encryption Standard (DES). The AES algorithm is divided into 10 rounds in total, and each round includes byte replacement, row displacement, column confusion, and round key plus 4 operations (except for the last round, which has no column confusion). This standard belongs to the block cipher algorithm and is also a widely used symmetric cipher algorithm. In different occasions, the requirements for the AES algorithm are also different. Sometimes it needs to be small in size, so that it can be easily written into some small-capacity chips, and sometimes it needs to be very fast in encryption, so the design for AES algorithm implementation It i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06H04L9/00
CPCH04L9/002H04L9/0631
Inventor 胡红钢汪仔业刘石刚
Owner UNIV OF SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products