Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

81 results about "Power attack" patented technology

Software mask defense scheme capable of preventing attack on advanced encryption standard (AES) algorithm based on power analysis

The invention discloses a software mask defense scheme capable of preventing attack on advanced encryption standard (AES) algorithm based on power analysis. The software mask defense scheme comprises steps of introducing a mask matrix M, and arranging three random mask defense points in each round of encryption operation; protecting the three mask defense points through a group of mask sequences generating M during each encryption; arranging a counter C in a crypto chip, superposing original values for each encryption, and finishing construction of the matrix M when the superposed value reaches the threshold value T1; when the superposed value reaches the threshold value T2, rearranging the counter C, updating the matrix M, and repeating the step over and over again. The three random mask defense points can perform mask defense on an important intermediate value calculated at least when few of subkeys are exhausted, therefore, high-order difference power attack can be effectively defended, and security of AES secret keys are protected. Furthermore, the mask matrix is updated through a queue mode, therefore, replacement frequency of random masks is reduced, and defense cost is reduced.
Owner:CHONGQING UNIV

Differential power attack testing method for DES (data encryption standard) algorithm circuit

InactiveCN103532973ASolve the technical difficulties of power consumption attack testingReduce risk of redesignEncryption apparatus with shift registers/memoriesData switching networksCorrelation coefficientPassword
The invention discloses a differential power attack testing method for a DES algorithm circuit. A DES algorithm is a widely-applied grouping symmetric encryption algorithm. According to the method, a differential power attack test is performed on the DES algorithm circuit at a design stage, and the method comprises the steps as follows: (1), functional simulation and acquisition of a power consumption sample; (2), preprocessing of the power consumption sample; (3), acquisition of a hypothetical power consumption sample; and (4) calculation of correlation coefficients and analysis of attack results. According to the differential power attack testing method, only varying power consumption points are sampled, a large number of power consumption sample data are saved, the power attack calculation amount is reduced substantially, the method has the advantages of high evaluation efficiency and high speed, and above all, the power attack test can be performed at the circuit design stage, so that the anti-attack capability of a password circuit is evaluated in advance, and the redesign risk of the DES circuit after assembly line production of chips is reduced.
Owner:SOUTHEAST UNIV

Circuit structure for preventing power attacks on grouping algorithm

The invention provides technology which can effectively resist to attacks on modules, chips, smart card bodies and the like adopting a grouping encryption and decryption algorithm through power analysis (simple power analysis (SPA) and difference power analysis (DPA)) or electromagnetic radiation analysis (DEMA) to obtain encryption and decryption operation secret keys and a circuit implementation structure of the technology. In application of a high-safety smart card, including but not limited to application areas such as electronic identification cards, debit cards and social security cards, the circuit structure can effectively protect the grouping encryption modules, the chips, the smart card bodies and the like and prevent the encryption and decryption operation secret keys from decoding and obtaining by the power analysis or the electromagnetic radiation analysis. The circuit structure can improve efficiency of encryption operation in continuous encryption operation, improves safety protection strength on the grouping encryption modules, the chips, the smart card bodies and the like, guarantees execution efficiency of the encryption operation, and has good innovation, practical applicability and effectiveness.
Owner:BEIJING CEC HUADA ELECTRONIC DESIGN CO LTD

Anti-power-attack method and device for DES (Data Encrypt Standard) algorithm

ActiveCN104639312AOvercome the flaw of leaking password informationEffective cover upEncryption apparatus with shift registers/memoriesS-boxCiphertext
The invention discloses an anti-power-attack method and device for a DES (Data Encrypt Standard) algorithm. The method comprises the following steps: performing exclusive-or operation on a first-round sub-key and a first mask; determining a first-round correction S-box according to the first mask on the basis of an original first-round S-box, and substituting the original first-round S-box; performing exclusive-or operation on the back half part of first-round input data and a second mask, wherein an exclusive-or operation result is the front half part of first-round output data; in second to sixteenth rounds, substituting the original S-box with identical or different correction S-boxes, and determining a correction S-box according to a mask carried by a wheel key and a mask carried by the back half part of wheel input data in each round, wherein other algorithm flows are the same as a first-round algorithm flow; and performing exclusive-or operation on a result obtained after the execution of reverse initial permutation on sixteenth-round output, wherein the result of the exclusive-or operation is an output cipher text. Through the anti-power-attack method for the DES algorithm provided by the invention, power attacks can be effectively resisted.
Owner:STATE GRID CORP OF CHINA +1

Password mask method for enhancing attack resistance ability

ActiveCN104618094AEnhanced resistance to differential power attacksSave hardware resourcesEncryption apparatus with shift registers/memoriesAlgorithmPassword
The invention discloses a password mask method for enhancing attack resistance ability. The password mask method for enhancing the attack resistance ability includes an encryption process. The encryption process includes steps: (1) introducing an original random number X, and performing exclusive-or operation on a clear text; (2) performing IP (internet protocol) initial displacement, and then dividing the clear text into an L portion and an R portion, and furthermore introducing random numbers Xy and Xz, generated in the middle process; (3) introducing F functions amended by mask codes, and performing n turns of F function operation; (4) combining the L portion with the R portion, and then performing an FP inverse initial permutation; (5) introducing the original random number X, and performing the exclusive-or operation so as to obtain a cipher text C. The password mask method for enhancing the attack resistance ability can achieve different effects of the mask codes by only using two types of the F functions amended by the mask codes during the whole encryption and decryption process, and only needs to achieve two types of SM-Box, and compared with other schemes with CPA attack resistance, the password mask method for enhancing the attack resistance ability can save a great number of hardware resources and reduce cost on the premise of substantially enhancing differential power attack and related power consumption attack resistance.
Owner:SHANDONG HUAYI MICRO ELECTRONICS

Side channel attack method for implementation of RSA (Rivest, Shamir and Adleman) cipher algorithms M-ary

The invention discloses a side channel energy analytical attack method by the aid of multiplication output during implementation of power residue computing algorithms M-ary in RSA (Rivest, Shamir and Adleman) cipher algorithms. A core of the side channel energy analytical attack method includes that multiplication output is used as an attack object to implement CPA (correlation power attack) when power residue computing is implemented by the aid of the algorithms M-ary. The method includes steps of (1), acquiring signals and building sampling matrixes; (2), selecting the multiplication output to be used as the attack object; (3), determining correlation models; (4), guessing circulation index values and acquiring intermediate value matrixes by means of computing; (5), acquiring simulation energy consumption matrixes by means of computing; (6), acquiring linear correlation coefficients among the matrixes determined in the steps (1) and (5) by means of computing and obtaining correct circulation indexes by means of attacking; (7), repeatedly carrying out steps (4), (5) and (6) to obtain all correct circulation indexes by means of attacking, and serially connecting all the correct circulation indexes with one another to obtain complete indexes. The side channel energy analytical attack method has the advantages that the RSA cipher algorithm analytical attack flexibility and effectiveness can be enhanced by the aid of the novel side channel attack method for the algorithms M-ary, and an RSA cipher algorithm analytical attack success rate can be increased by the aid of the novel side channel attack method for the algorithms M-ary.
Owner:CHENGDU UNIV OF INFORMATION TECH +3

An account book accounting method of a block chain network with parallel chains periodically converged

ActiveCN109711842AReduce hardware costsImprove computing power offensive and defensive capabilitiesPayment protocolsPayment circuitsChain networkPower attack
The invention discloses an account book bookkeeping method of a blockchain network with parallel chains periodically converged, which relates to the field of blockchain and comprises a service bookkeeping step and a convergence step. The confluence step comprises the steps that firstly, in response to the fact that the current block number of each parallel chain is a confluence block number, stopping the service accounting step of the parallel chains; then, obtaining the Hash value of the previous block of each parallel chain; then, generating a newly added convergence block according to the hash value of each previous block and a preset convergence block generation rule; and finally, adding the newly-added convergence block to each parallel chain on the node, and sending the newly-added convergence block to the block chain network so as to facilitate consensus of other nodes. The block chain network comprises a plurality of parallel chains, the hardware cost at the initial stage of block chain project construction is reduced, meanwhile, a plurality of block chains are regularly crossed to form a convergence block, and the computing power attack defense capability of the whole block chain network is improved.
Owner:西安纸贵互联网科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products