Power consumption attack resisting method based on cyclic shift of bit permutation and fixed permutation table

A bit permutation and permutation table technology, applied in the field of cryptographic algorithms, can solve the problems of increasing the degree of confusion, increasing the difficulty of attacks, and low resistance to power consumption attacks, and achieving the effect of high degree of confusion and increased difficulty

Pending Publication Date: 2020-12-04
NANJING LOW POWER IC TECH INST CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the improved power consumption attack resistance of this scheme is small. In addition, certain combinational logic will be added before and after the register, which will affect the performance of the cryptographic device.
[0004] An anti-power attack scheme based on dynamic intermediate value storage. Taking the DES algorithm as an example, the introduction adds a pair of registers. During the calculation process, the calculated intermediate value will be alternately stored in the two pairs of registers, so that the corresponding The intermediate values ​​of the two adjacent calculations are stored in different pairs of registers to improve the power consumption attack resistance of the cryptographic device, but this solution will double the register consumption
[0005] An anti-power consumption attack scheme based on 4-bit replacement, which divides a byte into high 4 bits and low 4 bits, and then replaces them respectively according to the replacement table. After the replacement table is used, it will be updated according to the random number. Although the scheme can increase the attack difficulty to a certain extent, it consumes a large additional area
[0006] Although the above scheme can improve the power consumption attack resistance of the cryptographic equipment to a certain extent, on the one hand, the enhanced power consumption attack resistance is limited; , but also requires additional resource consumption, that is, the construction of the random number generator

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power consumption attack resisting method based on cyclic shift of bit permutation and fixed permutation table
  • Power consumption attack resisting method based on cyclic shift of bit permutation and fixed permutation table
  • Power consumption attack resisting method based on cyclic shift of bit permutation and fixed permutation table

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0029] The anti-power consumption attack method based on the cyclic shift of bit permutation and fixed permutation table described in the present invention comprises steps:

[0030] (1-1) Input plaintext, when a round of calculation is completed, input different paths according to the state; if the calculation is completed, directly output the ciphertext; if the calculation is not completed, the intermediate value is bit-replaced and stored in the register;

[0031] (1-2) Before the next round of calculation starts, the bit permutation recovery operation is performed first, so that the intermediate values ​​are restored to the original order, and subsequent calculations are performed.

[0032] Bit permutation includes cyclic shift scheme and fixed permutation table scheme.

[0033] Such as figure 1 As shown, bit permutation ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a power consumption attack resisting method based on cyclic shift of bit permutation and a fixed permutation table, which comprises the following steps of: inputting a plaintext, and after a round of calculation is finished, performing bit permutation on an intermediate value and storing the intermediate value into a register; and before the next round of calculation is started, performing bit permutation recovery operation, so that the intermediate value is recovered to the original sequence, and subsequent calculation is carried out. The bit permutation comprises a cyclic shift mode and a fixed permutation table mode. In the cyclic shift scheme, the control signals of the bit permutation module and the bit permutation recovery module are the same, so that one module can be shared, and half of resource overhead is saved. In the scheme of the fixed permutation table, inverse transformation of the fixed permutation table is the fixed permutation table, namely, the original sequence can be recovered through two times of same transformation, resources can be repeatedly utilized, and extra area expenditure is reduced. And meanwhile, the positions of the ith timeand the (i+1)th time are completely staggered, so that for the registers at the same position, the data of two adjacent times relate to all 16 bytes in the past, and the data confusion degree is increased to the maximum.

Description

technical field [0001] The invention relates to the field of cryptographic algorithms, in particular to a power consumption attack resistance method based on bit permutation cyclic shift and fixed permutation table. Background technique [0002] For hardware-implemented cryptographic algorithm schemes, the attacker's focus is often on the operation of writing intermediate values ​​into registers. In this operation, the energy consumption of the cryptographic device will vary according to the flipping of the register. Therefore, if the data writing process can be confused, the anti-power consumption attack capability of the cryptographic device can be improved to a certain extent. [0003] The anti-power consumption attack scheme based on register randomization divides the data into 4 groups after the calculation is completed, and then randomly stores them in 4 registers, and restores the intermediate value data to the normal order before the next round of calculation. This ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/72G06F21/75
CPCG06F21/602G06F21/72G06F21/755
Inventor 陈庆张晓宇
Owner NANJING LOW POWER IC TECH INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products