Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Differential power consumption analysis shield circuit for DES encrypted chip

A technology for differential power analysis and shielding circuits, which is applied in the field of information security and can solve problems such as increasing noise, increasing circuit power consumption, and increasing circuit noise.

Inactive Publication Date: 2006-03-29
FUDAN UNIV +1
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] Regarding how to resist differential power analysis, researchers have proposed a variety of solutions, such as increasing circuit noise, data shielding, and designing circuits based on logic and asynchronous logic based on sensitive amplifiers, etc., but these solutions need to introduce additional noise and random numbers. Change the algorithm flow, even change the mainstream design logic
The key to resisting differential power analysis is to reduce its signal-to-noise ratio. A direct method is to add circuit noise, but the noise generating circuit will increase the power consumption of the circuit, and it is also very difficult to determine how much noise needs to be added to defend against differential power analysis. Therefore, from another perspective, trying to reduce the value of the differential power signal can also reduce the signal-to-noise ratio of the differential power analysis. If the power difference in different states of the circuit tends to zero, the differential power analysis will fail

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Differential power consumption analysis shield circuit for DES encrypted chip
  • Differential power consumption analysis shield circuit for DES encrypted chip
  • Differential power consumption analysis shield circuit for DES encrypted chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028]Further describe the present invention below in conjunction with accompanying drawing.

[0029] The DES encryption process is divided into three stages. First, after an initial permutation of the 64-bit plaintext, bit rearrangement produces the permuted input. The next stage consists of 16 loops over the same function, which itself contains both permutation and replacement functions. The 64-bit output of the last cycle (the 16th round) is a function of the input plaintext and the key, and its left and right parts are exchanged to obtain the pre-output. Finally, a 64-bit ciphertext is generated by a permutation inverse to the initial permutation.

[0030] The attacker using the differential power analysis method selects the decision equation according to the calculation process of the 16th round, and attacks the 16th round key that enters each S box in turn, so as to obtain a total of 48 bits of key information, and then only needs to exhaustively enumerate Obtaining t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention relates to a differential power loss analysis screen circuit applied in the DES ciphered chips composed of a screen unit and a complementary register unit to be connected with each other combining the basic structure of the DES ciphered plan. This invention is mainly against the cryptographic key of the 16-turn operation of the DES ciphered flow, the operation results of the 15-turn are sent to registers L15 and R15, in which, L15 is composed of two parts: an ordinary one of 28 bit and complementary one of 4 bit, part results of the 15-turn operation, the sub- cryptographic key of the 16-turn and the preset false sub-cryptographic key are sent to the screen unit.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a defense circuit of an encryption chip against differential power analysis attacks. Background technique [0002] With the rapid development and popularization of smart cards and computer networks, information security issues have become increasingly prominent, so various forms of dedicated cryptographic circuits and cryptographic algorithm processors are widely used in various products. At present, commonly used cryptographic algorithms can be roughly divided into two categories: symmetric algorithms represented by DES and AES and asymmetric algorithms represented by RSA and ECC. DES (Data Encryption Standard) is currently a very widely used data encryption method. It was adopted by the National Bureau of Standards in 1977 as the No. 46 Federal Information Processing Standard. [0003] Any security product or cryptographic system must face a problem of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06
Inventor 曾晓洋韩军陈俊郭亚炜
Owner FUDAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products