Countermeasure method in electronic component using secret key cryptographic algorithm and electronic component
A cryptographic algorithm and component technology, applied in countermeasures against encryption mechanisms, record carriers used by machines, electrical components, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0068] The DES encryption algorithm (hereinafter referred to as DES or DES algorithm for short) includes 16 rounds of calculation, denoted as T1 to T16, as shown in FIGS. 3 and 4 .
[0069] DES starts with an initial permutation IP of input information M (Fig. 3). The input information is a 64-bit word f. After permutation, a 64-bit word e is obtained, which is cut in two to form the input parameters L0 to R0 of the first round (T1). L0 is a 32-bit word d including the 32 most significant bits of word e. R0 is a 32-bit word h including the 32 least significant bits of word e.
[0070] The key K is a 64-bit word q which itself is permuted and compressed to provide a 56-bit word r.
[0071] The first round consists of the operation EXP PERM on parameter R0, which includes an expansion and a permutation to provide word 1 of 48 bits.
[0072] The word 1 is combined with parameter K1 in an exclusive OR type operation denoted XOR to provide a 48-bit word b. Parameter K1 is a 48...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 