Circuit, chip and method for defending against energy attack on grouping algorithm

A technology of energy and circuits, applied in the field of information security, can solve the problem of high hardware cost of MASK technology, and achieve good defense effect and low cost

Active Publication Date: 2013-11-06
BEIJING SMARTCHIP SEMICON TECH CO LTD +2
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The existing anti-attack methods mainly cover the data in the operation process. For example, the commonly used MASK technology is to defend against energy differential attacks by masking the data in the operation process, but the hardware cost of the MASK technology is relatively high.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Circuit, chip and method for defending against energy attack on grouping algorithm
  • Circuit, chip and method for defending against energy attack on grouping algorithm
  • Circuit, chip and method for defending against energy attack on grouping algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] This technology performs jamming protection on the following two parts.

[0030] Scramble the data input to the register. Disturb the plaintext or key when it is input, for example, use the random number mask method to cover the plaintext or key, and prevent the attacker from obtaining the plaintext or key information through register attack or Hamming distance attack.

[0031] Disturbance protection is performed on the circle operation result in the circle data register. Prevent attackers from obtaining circle operation result information through register attack or Hamming distance attack.

[0032] Such as figure 2 As shown, a circuit for defending against grouping algorithm energy attacks, which includes: a circle operation module, a circle key generation module, a data random disturbance restoration unit, a circle data random disturbance restoration unit and a MUX2_1 module; the data random disturbance restoration unit , the MUX2_1 module, the circle data random ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a circuit, a chip and a method against power attack for grouping algorithms, the circuit comprising: a round operation module, a round key generation module, a data random perturbation and recovery unit, a round data random perturbation and recovery unit, and a MUX2_1 module; the method comprising: a random perturbation and a random perturbation and recovery algorithms. The circuit, the chip and the method against power attack for grouping algorithms provided by the present invention, use the random perturbation and the random perturbation and recovery algorithms, to directly conceal the information of the plain text and the round data in registers with little cost, thus making defense effects better.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to a circuit, a chip and a method for defending against group algorithm energy attacks. Background technique [0002] With the development of information technology, computer applications have penetrated into various fields of social life, especially in e-commerce, making people more and more dependent on information, which makes information security technology particularly important. Encryption, as an important part of the information security field, has also been paid more and more attention. Encryption has a long history and various cryptographic algorithms. Cipher algorithms can be divided into block algorithms and stream cipher algorithms according to the processing of plaintext data. A block algorithm is an algorithm for encrypting a set of plaintexts of fixed length. It groups the plaintext according to a certain bit length, and all the plaintext group and t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/28
CPCH04L9/28H04L9/003H04L9/0631
Inventor 李娜胡晓波赵东艳王于波张海峰
Owner BEIJING SMARTCHIP SEMICON TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products