Mask protection method and device for advanced encryption standard (AES) algorithm

An advanced encryption standard and masking technology, applied in encryption devices with shift registers/memory, countermeasures against encryption mechanisms, secure communication devices, etc., can solve the problem of reducing the use of resources in defense methods, large resource overhead, and many resources, etc. question

Pending Publication Date: 2022-06-17
INST OF MICROELECTRONICS CHINESE ACAD OF SCI
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the current protection method uses more resources and has a large resource overhead, so there is a need to reduce the resource usage of the protection method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mask protection method and device for advanced encryption standard (AES) algorithm
  • Mask protection method and device for advanced encryption standard (AES) algorithm
  • Mask protection method and device for advanced encryption standard (AES) algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be described clearly and completely below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present application.

[0060] With the rapid development of computer and other related technologies, it has entered the information society, and data security is extremely important for various fields such as finance or military. There are various data protection methods that can be used to protect data security.

[0061] Data can currently be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a mask protection method and device for an AES (Advanced Encryption Standard) algorithm, and the method comprises the steps: carrying out the XOR processing of data carrying an ith round of mask and key data, multiplexing N multiplication modules to carry out the inversion operation and affine transformation, carrying out the line transformation, carrying out the mask compensation if i is equal to 10, and then carrying out the mask removal processing, and outputting the ciphertext subjected to key data processing, if i is less than 10, carrying out column confusion, then carrying out mask compensation to obtain jth-round data carrying a mask, and continuing to execute the step of carrying out XOR processing on the jth-round data carrying the mask and the key data, j = i + 1, and j is more than or equal to 2 and less than or equal to 10. That is to say, when the inverse operation is carried out, the multiplication module is reused, the inverse operation in the AES algorithm is optimized, compared with resources needed by multiplication modules in other protection methods, the resource overhead occupied by the multiplication module is greatly reduced, and the requirements for reducing the used resources of the protection method and reducing the resource overhead are met.

Description

technical field [0001] The invention relates to the field of computers, in particular to a mask protection method and device for the Advanced Encryption Standard AES algorithm. Background technique [0002] With the rapid development of computer and other related technologies, it has entered the information society, and data security is extremely important for various fields such as finance or military. There are various data protection methods that can be used to protect data security. [0003] Data can currently be encrypted to keep it safe. A commonly used traditional encryption algorithm is an Advanced Encryption Standard (Advanced Encryption Standard, AES) algorithm. However, the AES algorithm can also be cracked through a variety of attack methods, and can be protected against the AES algorithm to enhance data security. [0004] However, the current protection methods use a lot of resources and have a large resource overhead, so there is a need to reduce the resourc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/00
CPCH04L9/0631H04L9/003
Inventor 姜佳怡冯燕陈岚
Owner INST OF MICROELECTRONICS CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products