Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method of resisting power consumption attack based on d+1 order mask

An anti-power consumption and masking technology, applied in encryption devices with shift registers/memory, digital transmission systems, secure communication devices, etc., can solve the problem of inability to resist high-order power consumption attacks, improve the ability to resist power consumption attacks, and cryptographic equipment Threats and other problems, to achieve the effect of improving generation efficiency, reducing computational complexity, and improving readability

Active Publication Date: 2020-01-31
HENGYANG NORMAL UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, the attack process of HODPA is more complicated than the previous two attacks, and the sample size required is also larger, which poses a greater threat to cryptographic devices
[0005] There are usually two methods used to combat power consumption attacks. One is to design a new cryptographic algorithm so that the algorithm itself has the ability to resist power consumption attacks, and the other is to add anti-power consumption attack operations to the original cryptographic algorithm, namely Add a mask. The ordinary mask simply XORs each byte of the plaintext with an eight-bit random mask. It can only resist general simple power consumption attacks, but cannot resist high-order power consumption attacks. Anti-power consumption attacks Ability to be improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of resisting power consumption attack based on d+1 order mask
  • A method of resisting power consumption attack based on d+1 order mask
  • A method of resisting power consumption attack based on d+1 order mask

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The present invention will be further described below in conjunction with examples.

[0060] The present invention provides an anti-power consumption attack method based on a d+1 order mask, which is used for resisting power consumption attacks. The anti-power consumption attack operation is added to the original cryptographic algorithm, that is, a mask is added. In the original encryption algorithm, the present invention divides the original text into multiple points to resist, and designs an S-box. This embodiment realizes the protection of the high-order mask of the AES algorithm, improves the original encryption algorithm, and obtains an anti-power consumption attack The new encryption method for the operation.

[0061] A method for resisting power consumption attacks based on a d+1 order mask provided by the present invention comprises the following steps:

[0062] S1: Split the plaintext information into d+1 parts and generate d eight-bit random value masks accor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a power consumption attack resistance method based on a d+1-order mask, which comprises the following steps of: splitting a plaintext into a plurality of parts, enabling all mask exclusive-OR results after splitting to be equal to the plaintext, and enabling any one part to be independent from an unsplit plaintext; generating a random value mask, and updating the mask to obtain a random mask containing plaintext information; And constructing a d + 1-order security S box replacement algorithm on the basis of security multiplication to construct an integral d + 1-order mask implementation method. The method has the advantages that high-order power consumption attack protection is carried out on the lightweight block cryptographic algorithm, so that the lightweight block cryptographic algorithm can effectively resist high-order power consumption attack, and meanwhile, required calculation and space resources are few, the efficiency is high, and the method is suitable for cryptographic algorithm hardware implementation.

Description

technical field [0001] The invention belongs to the technical field of encryption security, and in particular relates to an anti-power consumption attack method based on a d+1 order mask. Background technique [0002] With the rapid development and wide application of information technology, information security has been paid more and more attention by people. Including the security of the cryptographic algorithm itself and the security of the equipment on which the cryptographic algorithm runs, and the modern encryption algorithm itself has been able to resist traditional cryptanalysis methods. Due to the limitations of equipment technology, cryptographic equipment will inevitably leak information such as power consumption, computing time, and electromagnetism when it is running. This information can be used by attackers to crack the key. [0003] The attacker does not directly analyze the cryptographic algorithm itself, but collects the energy information leaked from cryp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00H04L9/06
Inventor 李浪欧雨
Owner HENGYANG NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products