Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-attack block cipher encryption method for multi-scene application

A technology of block cipher and encryption method, which is applied in the field of embedded microcontrollers, can solve the problem that it is difficult for attackers to obtain effective information, and achieve the effects of reducing chip area consumption, increasing difficulty, and increasing attack difficulty

Pending Publication Date: 2022-03-22
NO 47 INST OF CHINA ELECTRONICS TECH GRP
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] With the information leakage during the encryption process, attackers have developed many attack methods such as energy attack and fault attack. Therefore, the defense in the encryption process is an important part of the defense process. There are different defense methods for different attack methods. , for some defense methods may introduce new loopholes, this paper uses interference and insertion methods to make it difficult for attackers to obtain effective information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-attack block cipher encryption method for multi-scene application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention will be described in detail below according to the accompanying drawings.

[0024] The design concept of the controller with the encryption algorithm of the anti-attack function is as follows: figure 1 Shown:

[0025] The operation process of the encryption algorithm is to first write data into the algorithm control register through the random number module, and then the controller performs the encryption operation until the operation ends. The random number module (RNG) writes random numbers into the registers in the encryption control module, and updates them when idle. After the user writes 128bit plaintext into the registers, when the encryption operation is started under the full anti-attack mode, the controller One set of random numbers will be read, according to the value of the first set of 128bit random numbers, and according to user settings, it is determined to insert k dummy rounds in the i-th round to ensure that the real encryption p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an anti-attack block cipher encryption method for multi-scene application. Firstly, a group of random numbers generated by a random number module are pre-stored in a register, plaintexts are encrypted by designing two groups of round functions at the same time, and irrelevant data are encrypted by using irrelevant secret keys to interfere a power consumption curve of a current chip while the correct plaintexts are encrypted, so that the power consumption curve acquired by an attacker contains irrelevant power consumption, and the analysis difficulty of the power consumption curve is increased; meanwhile, a random pseudo wheel is inserted into 10-round encryption in normal operation, so that a fault injection attack is prevented; when no attacker attacks, the two groups of round functions can be used at the same time, two groups of plaintexts are encrypted at the same time, and the encryption speed is increased.

Description

technical field [0001] The invention belongs to the field of embedded micro-controllers, and proposes a block cipher encryption method capable of preventing attacks to a certain extent. Background technique [0002] With the wide-scale application of smart devices, data security in the process of data encryption will be considered by people, and how to defend against attacks by attackers in the process of encryption will be an important aspect of data security. The encryption algorithm has been verified by rigorous mathematical reasoning when it was proposed, and it is confirmed that it is irreversible in the case of known ciphertext, but in the actual implementation of the encryption process, it is always accompanied by other loopholes, which can be obtained after simple analysis key. [0003] With the information leakage during the encryption process, attackers have developed many attack methods such as energy attack and fault attack. Therefore, the defense in the encrypt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F7/58
CPCG06F21/602G06F7/588
Inventor 赵力强陈晓棠王爽韩旭东唐虹
Owner NO 47 INST OF CHINA ELECTRONICS TECH GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products