Unlock instant, AI-driven research and patent intelligence for your innovation.

AES encrypted circuit structure for data stream executed in desequencing

A circuit structure, encryption circuit technology, applied in the direction of encryption device with shift register/memory, etc., can solve the problem of not being accepted as

Inactive Publication Date: 2011-08-17
TSINGHUA UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0034] The AES algorithm is based on the Rijndael algorithm as the core. However, some features of the Rijndael algorithm have not been accepted as the AES standard. The Rijndael algorithm supports any 32-bit span packet length between 128 bits and 256 bits, but the AES standard only supports 128 bits. plaintext length, key length of 128, 192 or 256 bits

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • AES encrypted circuit structure for data stream executed in desequencing
  • AES encrypted circuit structure for data stream executed in desequencing
  • AES encrypted circuit structure for data stream executed in desequencing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0167] We implemented a data stream AES encryption chip (THDFAES04) according to the present invention, and conducted a film casting experiment. The following uses this as an example to introduce specific implementation methods:

[0168] 1. How to work

[0169] The chip processes one packet at a time. Before encryption starts, the number of key columns (Nk) and the initial key are respectively sent to the setting register and initial key memory inside the chip through the data input bus. Then send the plaintext packets into the chip. The start signal triggers the chip to start working. The final operation result is temporarily stored in the output register. When the output register is filled-that is, after the entire packet is generated, the end signal (OK) becomes high, and the result data can be read from the data output bus. Every time a new group is entered, the data in the initial key memory will be rewritten into the internal key register.

[0170] 2. Circuit structure

[01...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Structure of Rijindael encrypted circuit of executing in desequencing belongs to cipher IC in area of resisting analytical attack of difference power consumption. Circuit structure integrated in a chip contains the input part and the output part to accomplish expansion and expansion loop of cryptographic-key including channel switch unit, storages of initial cryptographic-key, AK temporary storage unit of arithmetic unit for expansion of cryptographic-key, and matching check unit. Circle transforming loop for converting circled cryptographic-key includes switch unit for circled updating channel, AddKey arithmetic unit, EU arithmetic unit, AK temporary storage unit and relevant check unit. Using bit-by-bit hybrid operation, row shift operation, circled iterated operation etc for circled cryptographic-key and information of state obtains cipher text, which is output through output part. The invention lowers 66% difference power consumption so as to raise difficulty of attack.

Description

Technical field: [0001] The invention is used to solve the problem of anti-differential power analysis attack of crypto integrated circuit Background technique: [0002] With the widespread application of key storage data security integrated circuits such as smart cards and pay TV cards, power analysis attacks, especially differential power attacks (DPA), have begun to appear, and have quickly become an important threat to data storage cryptographic chips. Power consumption analysis attacks are hardware-oriented attacks that process power current changes in data engineering by collecting chips and obtain data information from them. Among them, the most commonly used differential power analysis attack is to collect the working current data of multiple chips, and advance part of the key by statistically checking the power consumption sample value at each time. Making the execution time of each operation of the circuit random is one of the important ways to combat differential powe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06
Inventor 孙义和李翔宇
Owner TSINGHUA UNIV