Encryption circuit for performing virtual encryption operation

A technology of encryption circuit and virtual operation, applied in countermeasures against encryption mechanism, encryption device with shift register/memory, electrical components, etc.

Pending Publication Date: 2020-04-14
SAMSUNG ELECTRONICS CO LTD
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Hackers may perform side-channel analysis att...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption circuit for performing virtual encryption operation
  • Encryption circuit for performing virtual encryption operation
  • Encryption circuit for performing virtual encryption operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Hereinafter, embodiments will be described in detail with reference to the accompanying drawings.

[0023] figure 1 is a block diagram of a computing device 1000 according to an embodiment. figure 1 is a block diagram illustrating a computing device 1000 including an electronic device and an encryption circuit according to an embodiment. In one embodiment, the computing device 1000 may include a processor device 1100 , a working memory 1200 , a storage memory 1300 , a user interface 1400 and a bus 1500 .

[0024] For example, computing device 1000 may be one of various electronic devices, such as a desktop computer, laptop computer, tablet computer, workstation, server, digital television (TV), video game console, smartphone, and wearable device, but the implementation Examples are not limited to this.

[0025] The processor device 1100 may control the overall operation of the computing device 1000 . Processor device 1100 may be configured to perform various arithme...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An encryption circuit includes a pipelined encryption core having a plurality of round cores. The pipelined encryption core is configured to perform a real round operation on each of the received multiple input data, and to generate encrypted data from the input data using an encryption operation including the real round operation. An encryption controller coupled with the pipelined encryption core is provided. The encryption controller is configured to control the pipelined encryption core so that at least one of the plurality of round cores performs a virtual round operation as part of the encryption operation. The pipelined encryption core is configured to perform a virtual encryption operation using at least one of the following items: (i) dummy data; and (ii) dummy encryption key.

Description

[0001] Cross References to Related Applications [0002] This application claims the benefit of Korean Patent Application No. 10-2018-0119306 filed on October 5, 2018, the disclosure of which is incorporated herein by reference in its entirety. technical field [0003] The inventive concept relates to an encryption circuit for performing an encryption operation and an operating method thereof, and more particularly, to an encryption circuit for performing a virtual encryption operation and a method for performing virtual encryption. Background technique [0004] Smart cards and integrated circuit (IC) cards include secure information about the user. There is a need for an encryption circuit for preventing security information about a user from leaking due to hacking or the like, which generates and transmits a ciphertext of security information transmitted through a signature or authentication process. [0005] Instead of directly manipulating input or output data, hackers ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/72
CPCG06F21/72H04L9/0631H04L2209/125H04L2209/08H04L9/003G06F21/602H04L9/002H04L2209/24G06F21/75G06F21/70H04L9/06G06F21/71G06F21/755H04L9/0618
Inventor 崔弘默金栽赫姜智守金贤镒申钟勋李惠秀
Owner SAMSUNG ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products