A Method of Preventing Differential Cryptanalysis Attacks

A cryptanalysis and differential technology, applied in the protection of internal/peripheral computer components, etc., can solve problems such as leakage of personal privacy information, and achieve the effect of improving security

Active Publication Date: 2021-06-18
NANJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Leakage of personal privacy information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method of Preventing Differential Cryptanalysis Attacks
  • A Method of Preventing Differential Cryptanalysis Attacks
  • A Method of Preventing Differential Cryptanalysis Attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0026] This embodiment improves on the problem of difficulty in protecting encryption chips from differential cryptanalysis attacks, and innovatively implements an effective method for preventing differential cryptanalysis attacks through plaintext analysis.

[0027] In order to prevent differential cryptanalysis attacks, a plaintext analysis module is proposed. When the chip is only running in the functional mode, the plaintext analysis module will not work to prevent additional power consumption. Once it is detected that the chip has entered the test mode, there is a threat of key information leakage. At this time, the plaintext analysis module starts to work. The three modules proposed in this embodiment are all modeled by verilog code and passed vcs verification. The overall block diagram of the design is as follows figure 1 As...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for preventing differential cryptanalysis attacks, which is realized by an adaptive scan chain, a control module, and a plaintext analysis module; the plaintext analysis module controls the adaptive scan chain so that two plaintexts that differ only in the last bit of one byte pass through Scan chain input with different structure, so that the two input plaintexts that can be cracked by differential cryptanalysis attack technology cannot produce an output that can be exploited by differential cryptanalysis attack technology; compared with complex scan chains, the designed circuit structure can To a certain extent, it confuses the attacker who uses the differential cryptanalysis attack, causing the attacker to recover wrong key information. Through experimental analysis, it is proved that the security of plaintext analysis technology with adaptive scan chain structure has been greatly improved.

Description

technical field [0001] The invention belongs to the field of hardware security, and in particular aims at testing AES circuits, and proposes a method for preventing differential cryptanalysis attacks. Background technique [0002] The information network has brought great convenience to people's life and production with its broad interconnection characteristics. While promoting the rapid development of modern society, information security issues have followed. It is based on the above considerations that scholars have proposed the concept of "secure chip". The principle is to add encryption circuits to the periphery of ordinary chips. The encryption algorithms that can be used for this encryption circuit are DES, AES, RSA and other algorithms. When it comes to testing issues, we have to mention DFT technology. The purpose of DFT technology is to detect the faults introduced in the process of chip manufacturing. Its realization principle is to change the chip by inserting sca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/75
CPCG06F21/75
Inventor 蔡志匡王明王子轩刘璐胡善文张翼郭宇锋
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products