Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

AES encrypted circuit structure for data stream executed in desequencing

A circuit structure, encryption circuit technology, applied in the direction of encryption device with shift register/memory, etc., can solve the problem of not being accepted as

Inactive Publication Date: 2006-04-19
TSINGHUA UNIV
View PDF0 Cites 63 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0034] The AES algorithm is based on the Rijndael algorithm as the core. However, some features of the Rijndael algorithm have not been accepted as the AES standard. The Rijndael algorithm supports any 32-bit span packet length between 128 bits and 256 bits, but the AES standard only supports 128 bits. plaintext length, key length of 128, 192 or 256 bits

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • AES encrypted circuit structure for data stream executed in desequencing
  • AES encrypted circuit structure for data stream executed in desequencing
  • AES encrypted circuit structure for data stream executed in desequencing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0164] We have realized a data stream AES encryption chip (THDFAES04) according to the present invention, and carried out the casting experiment. The following is an example to introduce the specific implementation method:

[0165] 1. Working method

[0166] The chip processes a group at a time, and before starting to encrypt, the key column number (NK) and the initial key are sent to the internal setting register and the initial key register of the chip respectively through the data input bus. Then the plaintext packet is sent to the chip. The start signal triggers the chip to start working. The final operation result is first temporarily stored in the output register. When the output register is full—that is, after the entire packet is generated, the end signal (OK) becomes high, and the result data can be read from the data output bus. The data in the initial key register is rewritten into the internal key scratchpad every time a new packet is started.

[0167] 2. Circu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Structure of Rijindael encrypted circuit of executing in desequencing belongs to cipher IC in area of resisting analytical attack of difference power consumption. Circuit structure integrated in a chip contains the input part and the output part to accomplish expansion and expansion loop of cryptographic-key including channel switch unit, registers of initial cryptographic-key, AK temporary storage unit of arithmetic unit for expansion of cryptographic-key, and matching check unit. Circle transforming loop for converting circled cryptographic-key includes switch unit for circled updating channel, AddKey arithmetic unit, EU arithmetic unit, AK temporary storage unit and relevant check unit. Using bit-by-bit hybrid operation, row shift operation, circled iterated operation etc for circled cryptographic-key and information of state obtains cipher text, which is output through output part. The invention lowers 66úÑ difference power consumption so as to raise difficulty of attack.

Description

Technical field: [0001] The invention is used to solve the problem of cryptographic integrated circuits resisting differential power analysis attacks Background technique: [0002] With the widespread application of key storage data security integrated circuits such as smart cards and pay TV cards, power analysis attacks, especially differential power attacks (DPA) began to appear, and quickly became an important threat to data storage cryptographic chips. Power consumption analysis attack is a hardware-oriented attack method that acquires data information by collecting chip processing power supply current changes in data engineering. Among them, the most commonly used differential power analysis attack is to collect the working current data of multiple chips, and advance part of the key by statistically testing the power consumption sample values ​​at each time. Making the execution time of each operation of the circuit random is one of the important ways to resist differe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
Inventor 孙义和李翔宇
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products