FPGA-based DPA attack resistant AES encryption method

An encryption method, data encryption technology, applied to an encryption device with a shift register/memory, key distribution

Inactive Publication Date: 2020-07-07
HANGZHOU DIANZI UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The traditional FPGA-based AES encryption method is vulnerable to differential power analysis (DPA, Differential Power Analysis) attacks, so an FPGA architecture that meets high-throughput and low-latency anti-DPA attacks is needed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • FPGA-based DPA attack resistant AES encryption method
  • FPGA-based DPA attack resistant AES encryption method
  • FPGA-based DPA attack resistant AES encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0032] On the contrary, the invention covers any alternatives, modifications, equivalent methods and schemes within the spirit and scope of the invention as defined by the claims. Further, in order to make the public have a better understanding of the present invention, some specific details are described in detail in the detailed description of the present invention below. The present invention can be fully understood by those skilled in the art without the description of these detailed parts.

[0033] see figure 1 , is the step flowchart of the embodiment of the present invention, and the techn...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an FPGA-based DPA attack resistant AES encryption method, which comprises the steps of: weakening strong correlation between a secret key and dynamic power consumption of an FPGA in an original encryption process through employing a random mask on a plaintext XOR during initial encryption, and effectively resisting a DPA attack for AES encryption; utilizing a redesigned sTable_mask and a mask removing operation, enabling the output encrypted data to accord with a standard AES encryption rule; and storing a plurality of sTable_masks in one ROM, so that table look-up operation logic is simplified. On the aspect of system architecture, a full pipeline design is adopted, and the inter-stage logic complexity is simplified by using a plurality of ROM table lookup modes, so that the maximum working frequency of the system is greatly improved, and the throughput of the system is further improved.

Description

technical field [0001] The invention belongs to the field of password attack and defense, and relates to an FPGA-based AES encryption method against differential power analysis attack. Background technique [0002] In recent years, with the gradual maturity of 5G technology, application scenarios that rely on high real-time characteristics, such as Internet of Vehicles and telemedicine, have gradually emerged. In these scenarios, it is necessary to ensure the safe transmission of data and meet the high throughput and low time requirements of data. To meet the delay requirements, using FPGA to encrypt and decrypt data has become a feasible solution. However, the traditional FPGA-based AES encryption method is vulnerable to differential power analysis (DPA, Differential Power Analysis) attacks, so an FPGA architecture that meets high throughput and low latency and resists DPA attacks is needed. Contents of the invention [0003] Aiming at the deficiencies of the prior art, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/06H04L9/08
CPCH04L9/0631H04L9/0869H04L63/0435
Inventor 黄继业刘鹏高明裕金昊炫吕群芳杨宇翔何志伟董哲康
Owner HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products