Unlock instant, AI-driven research and patent intelligence for your innovation.

Encryption method and system for resisting bypass attack

A technology of side-channel attack and encryption method, applied in the direction of digital data protection, random number generator, etc., can solve the problems of multi-operation time and small AES operation throughput, so as to reduce power consumption, resist side-channel attacks, and reduce operation Effects of process and time consumption

Pending Publication Date: 2022-04-12
SHANGHAI AISINOCHIP ELECTRONICS TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

And this transformation will consume more computing time, resulting in a smaller computing throughput of the overall AES

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method and system for resisting bypass attack
  • Encryption method and system for resisting bypass attack
  • Encryption method and system for resisting bypass attack

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0044] Such as figure 1 As shown, the present embodiment provides an encryption method against side-channel attacks, which is characterized in that it includes the following steps:

[0045] The encryption key is extended, and the round key used in each round is stored for use by the computing engine, and the computing engine includes a first computing engine, a second computing engine and a simulation computing engine. The first key and the second key obtained by expanding the encryption key are only expanded once and stored as keys for subsequent corresponding rounds of encryption operations. There is no need to re-expand the key for each round of operation, which saves time and improves the data throughput per unit time. The plaintext to be encrypted is input into the first calculation engine for one encryption, that is, the encryption operation of the first half number of rounds in the AES encryption process is performed, and the first calculation engine selects the round ...

no. 2 example

[0053] The difference from the first embodiment is that the first embodiment performs calculations on a single input plaintext, while this embodiment performs calculations on multiple consecutive input plaintexts, that is, a dynamic streaming operation is formed. The first calculation engine encrypts the first piece of plaintext data once to obtain the intermediate encrypted ciphertext of the first piece of plaintext data, and the second calculation engine performs secondary encryption on the intermediate encrypted ciphertext of the first piece of plaintext data; While the engine is performing secondary encryption on the intermediate encrypted ciphertext of the first piece of plaintext data, the first calculation engine once encrypts the second piece of plaintext data and then obtains the intermediate encrypted ciphertext of the second piece of plaintext data; at this time, the simulation The calculation engine function is blocked, and no calculation is performed. Continuous c...

no. 3 example

[0055] Such as Figure 2-Figure 3 As shown, the present embodiment provides an encryption system resistant to side channel attacks, which is characterized in that it includes:

[0056] The key expansion module 1 is used to expand the input key and store the round key used in each round for use by the calculation module. The calculation module includes a first calculation module 201, a second calculation module 202 and a simulation Computing module 4; Key expansion module 1 expands the key length (128 bits, 192 bits and 256 bits) of the input key according to the AES algorithm to generate the first key and the second key; After the key expansion is completed, the generated first key and the second key will be output to the first computing module 201, the second computing module 202 and the analog computing module 4 respectively, and the computing module will independently select a specific round according to the number of rounds of computing. key. It can be understood that, i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption method for resisting bypass attack, which comprises the following steps of: performing primary encryption on a plaintext to be encrypted through a first operation engine and a first secret key to generate an intermediate encrypted ciphertext; performing secondary encryption on the intermediate encrypted ciphertext through a second operation engine and a second secret key to generate an encrypted ciphertext corresponding to the plaintext to be encrypted; wherein in the continuous process of the primary encryption, based on the plaintext to be encrypted and a preset random sequence, analog encryption operation is performed through an analog operation engine; and in the continuous process of the secondary encryption, based on the preset random number sequence and the intermediate encryption ciphertext, performing the simulation encryption operation through the simulation operation engine. The simulation operation engine and the encryption operation engine are set to work at the same time, and the real power consumption of the operation engines is hidden, so that the actual power consumption of encryption operation is not directly obtained and analyzed, and the purpose of effectively resisting bypass attacks is achieved.

Description

technical field [0001] The invention belongs to the technical field of methods and devices for resisting energy analysis side-channel attacks, and in particular relates to an encryption method, system, electronic equipment and readable storage medium for resisting side-channel attacks. Background technique [0002] With the continuous popularization of the network and the increasing degree of social informatization, the importance of information security has been gradually highlighted. As the most powerful weapon in information security, encryption is playing an important role. The AES encryption algorithm has the advantages of fast encryption speed and easy implementation, and is widely used in various encryption scenarios. [0003] Any security product or cryptographic system must face a problem of how to defend against attacks and snooping. In recent years, a new powerful attack method has emerged, which is called Side Channel Attacks (SCA). Side-channel attack is to us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F7/58
Inventor 严鹏飞周玉洁王大永
Owner SHANGHAI AISINOCHIP ELECTRONICS TECH