Encryption method and system for resisting bypass attack
A technology of side-channel attack and encryption method, applied in the direction of digital data protection, random number generator, etc., can solve the problems of multi-operation time and small AES operation throughput, so as to reduce power consumption, resist side-channel attacks, and reduce operation Effects of process and time consumption
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0044] Such as figure 1 As shown, the present embodiment provides an encryption method against side-channel attacks, which is characterized in that it includes the following steps:
[0045] The encryption key is extended, and the round key used in each round is stored for use by the computing engine, and the computing engine includes a first computing engine, a second computing engine and a simulation computing engine. The first key and the second key obtained by expanding the encryption key are only expanded once and stored as keys for subsequent corresponding rounds of encryption operations. There is no need to re-expand the key for each round of operation, which saves time and improves the data throughput per unit time. The plaintext to be encrypted is input into the first calculation engine for one encryption, that is, the encryption operation of the first half number of rounds in the AES encryption process is performed, and the first calculation engine selects the round ...
no. 2 example
[0053] The difference from the first embodiment is that the first embodiment performs calculations on a single input plaintext, while this embodiment performs calculations on multiple consecutive input plaintexts, that is, a dynamic streaming operation is formed. The first calculation engine encrypts the first piece of plaintext data once to obtain the intermediate encrypted ciphertext of the first piece of plaintext data, and the second calculation engine performs secondary encryption on the intermediate encrypted ciphertext of the first piece of plaintext data; While the engine is performing secondary encryption on the intermediate encrypted ciphertext of the first piece of plaintext data, the first calculation engine once encrypts the second piece of plaintext data and then obtains the intermediate encrypted ciphertext of the second piece of plaintext data; at this time, the simulation The calculation engine function is blocked, and no calculation is performed. Continuous c...
no. 3 example
[0055] Such as Figure 2-Figure 3 As shown, the present embodiment provides an encryption system resistant to side channel attacks, which is characterized in that it includes:
[0056] The key expansion module 1 is used to expand the input key and store the round key used in each round for use by the calculation module. The calculation module includes a first calculation module 201, a second calculation module 202 and a simulation Computing module 4; Key expansion module 1 expands the key length (128 bits, 192 bits and 256 bits) of the input key according to the AES algorithm to generate the first key and the second key; After the key expansion is completed, the generated first key and the second key will be output to the first computing module 201, the second computing module 202 and the analog computing module 4 respectively, and the computing module will independently select a specific round according to the number of rounds of computing. key. It can be understood that, i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


