CN107980212A - The encryption method and computer-readable recording medium of anti-DPA attacks - Google Patents
The encryption method and computer-readable recording medium of anti-DPA attacks Download PDFInfo
- Publication number
- CN107980212A CN107980212A CN201780001940.4A CN201780001940A CN107980212A CN 107980212 A CN107980212 A CN 107980212A CN 201780001940 A CN201780001940 A CN 201780001940A CN 107980212 A CN107980212 A CN 107980212A
- Authority
- CN
- China
- Prior art keywords
- key
- true
- cipher
- corresponding ciphertext
- sub
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/003—Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
Encryption method and computer-readable recording medium, method the invention discloses a kind of anti-DPA attacks include:Generate multiple false keys;According to true key and the multiple false key, cipher key sets are obtained;A key is obtained from the cipher key sets successively as encryption key, to being encrypted in plain text, obtains the corresponding ciphertext of a key;After the key in the cipher key sets obtains, the corresponding ciphertext of true key is sent to receiving terminal.As being substantially due to the time of false key and true key computing, energy expenditure and electromagnetic radiation, so that differential power analysis method can not analyze the length for understanding key and true key participates in the time sequencing of computing, the energy spectrometer curve of generation is not fixed, also real key can not be just cracked, so that the security of encryption data be effectively ensured.
Description
Technical field
The present invention relates to field of information security technology, more particularly to a kind of encryption method of anti-DPA attacks and computer can
Read storage medium.
Background technology
POS machine is among process of exchange, using aes algorithm encrypting plaintext, due to calculating data among AES calculating processes
Or the operation of read-write register can produce different energy expenditure changes, DPA (differential power attack) technology is in small-signal bar
The bypass message for collecting signal can be analyzed under part, according to when some particular event occurs, encryption device energy expenditure
Probability distribution can be different from the feature of Average probability distribution, come analysing energy consumption information, Ke Yishi using statistical method
Do not go out correct key.
Defence DPA attacks are using the method for adding mask at present.However, although random value mask can defend DPA
Attack, but he must calculate random mask RM and the intermediate variable after mask is handled at the same time, in addition, often wheel calculating all must
New mask must be produced and the value of S box look-up tables is recalculated with mask, these calculating not only increase the expense of operation time,
It also add extra processor load and storage demand.
The content of the invention
The technical problems to be solved by the invention are:A kind of encryption method of anti-DPA attack is provided and computer-readable is deposited
Storage media, can improve enciphered data safety.
In order to solve the above-mentioned technical problem, the technical solution adopted by the present invention is:A kind of encryption method of anti-DPA attacks,
Including:
Generate multiple false keys;
According to true key and the multiple false key, cipher key sets are obtained;
A key is obtained from the cipher key sets successively as encryption key, to being encrypted in plain text, obtains described one
The corresponding ciphertext of key;
After the key in the cipher key sets obtains, the corresponding ciphertext of true key is sent to receiving terminal.
The invention further relates to a kind of computer-readable recording medium, is stored thereon with computer program, and described program is located
Reason device realizes following steps when performing:
Generate multiple false keys;
According to true key and the multiple false key, cipher key sets are obtained;
A key is obtained from the cipher key sets successively as encryption key, to being encrypted in plain text, obtains described one
The corresponding ciphertext of key;
After the key in the cipher key sets obtains, the corresponding ciphertext of true key is sent to receiving terminal.
The beneficial effects of the present invention are:By generating multiple false keys, and these false keys are made to join together with true key
With cryptographic calculation, be substantially due to the time of false key and true key computing, energy expenditure and electromagnetic radiation as so that it is poor
Point Energy Analysis for High can not analyze the length for understanding key and true key participates in the time sequencing of computing, the energy of generation
Analysis curve is not fixed, and also can not just crack real key.Encryption method proposed by the invention can not be attacked logical by DPA
Extraction feature is crossed to distinguish true and false key, the security of encryption data has been effectively ensured.
Brief description of the drawings
Fig. 1 is a kind of flow chart of the encryption method of anti-DPA attacks of the present invention;
Fig. 2 is the method flow diagram of the embodiment of the present invention one.
Embodiment
The design of most critical of the present invention is:The false key of addition participates in cryptographic calculation so that differential power analysis method without
Method cracks real key.
Explanation of nouns:
AES:Advanced Encryption Standard, i.e. Advanced Encryption Stardand, are American National Standard and technology
Rijndael algorithms determined by research are simultaneously used as high-level data encryption standard, to substitute original data encryption standards (DES);
Differential power is attacked:Differential Power Analysis (DPA), are a kind of methods by statistics point
Analysis a large amount of energy expenditure curves as caused by same key encrypts not isolog, by asking for being averaged for curve in different sets
Value discloses key value and encryption device.
Referring to Fig. 1, a kind of encryption method of anti-DPA attacks, including:
Generate multiple false keys;
According to true key and the multiple false key, cipher key sets are obtained;
A key is obtained from the cipher key sets successively as encryption key, to being encrypted in plain text, obtains described one
The corresponding ciphertext of key;
After the key in the cipher key sets obtains, the corresponding ciphertext of true key is sent to receiving terminal.
As can be seen from the above description, the beneficial effects of the present invention are:DPA attacks can not be distinguished true and false by extracting feature
Key, has been effectively ensured the security of encryption data.
Further, the true key storage is in the first register, and the multiple vacation key storage is in other registers
In;
It is described " to obtain a key from the cipher key sets successively as encryption key, to being encrypted in plain text, obtain institute
State the corresponding ciphertext of a key;When in the cipher key sets key obtain after, by the corresponding ciphertext of true key send to
Receiving terminal " is specially:
If a key takes out from first register, by the corresponding ciphertext of a key store to
In second register;
After the key in the cipher key sets obtains, the ciphertext in the second register is sent to receiving terminal.
Seen from the above description, by by true key and false key storage in different registers so that system can be with
Quickly and easily distinguish the true and false of key.
Further, the true key includes multiple true sub-keys, and each vacation key includes multiple false sub-keys respectively;
It is described " to obtain a key from the cipher key sets successively as encryption key, to being encrypted in plain text, obtain institute
State the corresponding ciphertext of a key;When in the cipher key sets key obtain after, by the corresponding ciphertext of true key send to
Receiving terminal " is specially:
A true sub-key or a false sub-key are obtained from the cipher key sets successively as encryption key, plaintext is carried out
Encryption, obtains the corresponding ciphertext of a sub-key;
After the sub-key in the cipher key sets obtains, the corresponding ciphertext of true sub-key is sent to receiving terminal.
Seen from the above description, method of the invention is suitable for block encryption computing.
Further, the encrypted algorithm is AES, 3DES, RSA, the close SM1 of state, the close SM2 of state or the close SM4 of state.
Seen from the above description, method of the invention is suitable for multiple encryption algorithms.
The present invention also proposes a kind of computer-readable recording medium, is stored thereon with computer program, described program is located
Reason device realizes following steps when performing:
Generate multiple false keys;
According to true key and the multiple false key, cipher key sets are obtained;
A key is obtained from the cipher key sets successively as encryption key, to being encrypted in plain text, obtains described one
The corresponding ciphertext of key;
After the key in the cipher key sets obtains, the corresponding ciphertext of true key is sent to receiving terminal.
Further, the true key storage is in the first register, and the multiple vacation key storage is in other registers
In;
It is described " to obtain a key from the cipher key sets successively as encryption key, to being encrypted in plain text, obtain institute
State the corresponding ciphertext of a key;When in the cipher key sets key obtain after, by the corresponding ciphertext of true key send to
Receiving terminal " is specially:
If a key takes out from first register, by the corresponding ciphertext of a key store to
In second register;
After the key in the cipher key sets obtains, the ciphertext in the second register is sent to receiving terminal.
Further, the true key includes multiple true sub-keys, and each vacation key includes multiple false sub-keys respectively;
It is described " to obtain a key from the cipher key sets successively as encryption key, to being encrypted in plain text, obtain institute
State the corresponding ciphertext of a key;When in the cipher key sets key obtain after, by the corresponding ciphertext of true key send to
Receiving terminal " is specially:
A true sub-key or a false sub-key are obtained from the cipher key sets successively as encryption key, plaintext is carried out
Encryption, obtains the corresponding ciphertext of a sub-key;
After the sub-key in the cipher key sets obtains, the corresponding ciphertext of true sub-key is sent to receiving terminal.
Further, the encrypted algorithm is AES, 3DES, RSA, the close SM1 of state, the close SM2 of state or the close SM4 of state.
Embodiment one
Fig. 2 is refer to, the embodiment of the present invention one is:A kind of encryption method of anti-DPA attacks, can be applied to POS machine, wraps
Include following steps:
S1:Generate multiple false keys;Wherein, 3-5 false key can be generated according to true key, this 3-5 false key is every
The fixed key that secondary start produces, remaining false key is to start to encrypt caused random cipher every time.
S2:According to true key and the multiple false key, cipher key sets are obtained;Will true key and false key be blended in one
Rise, true key is randomly dispersed among false key, its position uses random distribution, and position is not fixed;But in order to enable the system to
True key and false key are rapidly and accurately distinguished, can be by true key storage in the first register, by multiple false key storages
In other registers.
S3:A key is obtained from the cipher key sets successively as encryption key, to being encrypted in plain text, is obtained described
The corresponding ciphertext of one key.
S4:Judge whether a key takes out from first register, if so, then performing step S5.By
True key is only stored in the first register without storing false key, therefore, if a key is taken from the first register
Go out, then it represents that the key is true key.
S5:The corresponding ciphertext of one key is stored into the second register.False key is needed to being encrypted in plain text
Computing, but its obtained ciphertext is not sent to receiving terminal, simply allows it to participate in the process of computations, produces energy expenditure letter
Breath.Therefore, the corresponding ciphertext of true key ciphertext corresponding with false key is rapidly distinguished for convenience, true key is corresponding close
Text is separately stored with the corresponding ciphertext of vacation key, will the corresponding ciphertext of true key individually stored.
S6:After the key in the cipher key sets obtains, the corresponding ciphertext of true key is sent to receiving terminal, i.e.,
Ciphertext in second register is sent to receiving terminal.
Further, the true key includes multiple true sub-keys, and each vacation key includes multiple false sub-keys respectively;Example
Such as, the encryption key of AES is 128, can be divided into 16 sub-keys, each sub-key 8.Therefore, can be random by true sub-key
It is distributed among false sub-key, likewise, true sub-key is stored in the first register, false sub-key is stored in other posts
In storage.
In step s3, i.e., a true sub-key is obtained from the cipher key sets successively or a false sub-key is close as encrypting
Key, to being encrypted in plain text, obtains the corresponding ciphertext of a sub-key, and the corresponding ciphertext of true sub-key then is stored in
In two registers, finally after the sub-key in cipher key sets obtains, the corresponding ciphertext of true sub-key is sent to reception
End, i.e., send the ciphertext in the second register to receiving terminal.
Further, the method for the present embodiment is applicable to AES, 3DES, RSA, the close SM1 of state, the close SM2 of state, the close SM4 of state etc.
Encryption Algorithm.
The present embodiment makes these false keys participate in cryptographic calculation together with true key by generating multiple false keys, by
As time, energy expenditure in false key and true key computing with electromagnetic radiation is substantially so that differential power analysis side
Method can not analyze the length for understanding key and true key participates in the time sequencing of computing, and the energy spectrometer curve of generation is not solid
It is fixed, it also can not just crack real key.The security of encryption data has been effectively ensured.
Embodiment two
The present embodiment is a kind of computer-readable recording medium of corresponding above-described embodiment, is stored thereon with computer journey
Sequence, realizes following steps when described program is executed by processor:
Generate multiple false keys;
According to true key and the multiple false key, cipher key sets are obtained;
A key is obtained from the cipher key sets successively as encryption key, to being encrypted in plain text, obtains described one
The corresponding ciphertext of key;
After the key in the cipher key sets obtains, the corresponding ciphertext of true key is sent to receiving terminal.
Further, the true key storage is in the first register, and the multiple vacation key storage is in other registers
In;
It is described " to obtain a key from the cipher key sets successively as encryption key, to being encrypted in plain text, obtain institute
State the corresponding ciphertext of a key;When in the cipher key sets key obtain after, by the corresponding ciphertext of true key send to
Receiving terminal " is specially:
If a key takes out from first register, by the corresponding ciphertext of a key store to
In second register;
After the key in the cipher key sets obtains, the ciphertext in the second register is sent to receiving terminal.
Further, the true key includes multiple true sub-keys, and each vacation key includes multiple false sub-keys respectively;
It is described " to obtain a key from the cipher key sets successively as encryption key, to being encrypted in plain text, obtain institute
State the corresponding ciphertext of a key;When in the cipher key sets key obtain after, by the corresponding ciphertext of true key send to
Receiving terminal " is specially:
A true sub-key or a false sub-key are obtained from the cipher key sets successively as encryption key, plaintext is carried out
Encryption, obtains the corresponding ciphertext of a sub-key;
After the sub-key in the cipher key sets obtains, the corresponding ciphertext of true sub-key is sent to receiving terminal.
Further, the encrypted algorithm is AES, 3DES, RSA, the close SM1 of state, the close SM2 of state or the close SM4 of state.
In conclusion the encryption method and computer-readable recording medium of a kind of anti-DPA attacks provided by the invention, pass through
Multiple false keys are generated, and these false keys is participated in cryptographic calculation together with true key, due to false key and true key computing
Time, as energy expenditure and electromagnetic radiation be substantially so that differential power analysis method, which can not be analyzed, understands key
Length and true key participate in the time sequencing of computing, and the energy spectrometer curve of generation is not fixed, and also can not just crack true
Key.Encryption method proposed by the invention can not be attacked by DPA and true and false key is distinguished by extracting feature, effectively be protected
The security of encryption data is demonstrate,proved.
Claims (8)
- A kind of 1. encryption method of anti-DPA attacks, it is characterised in that including:Generate multiple false keys;According to true key and the multiple false key, cipher key sets are obtained;A key is obtained from the cipher key sets successively as encryption key, to being encrypted in plain text, obtains a key Corresponding ciphertext;After the key in the cipher key sets obtains, the corresponding ciphertext of true key is sent to receiving terminal.
- 2. the encryption method of anti-DPA attacks according to claim 1, it is characterised in that the true key storage is first In register, the multiple vacation key storage is in other registers;It is described " to obtain a key from the cipher key sets successively as encryption key, to being encrypted in plain text, obtain described one The corresponding ciphertext of key;After the key in the cipher key sets obtains, the corresponding ciphertext of true key is sent to reception End " is specially:If a key takes out from first register, the corresponding ciphertext of a key is stored to second In register;After the key in the cipher key sets obtains, the ciphertext in the second register is sent to receiving terminal.
- 3. the encryption method of anti-DPA attacks according to claim 1, it is characterised in that the true key includes multiple true Sub-key, each vacation key include multiple false sub-keys respectively;It is described " to obtain a key from the cipher key sets successively as encryption key, to being encrypted in plain text, obtain described one The corresponding ciphertext of key;After the key in the cipher key sets obtains, the corresponding ciphertext of true key is sent to reception End " is specially:A true sub-key or a false sub-key are obtained from the cipher key sets successively as encryption key, to adding in plain text It is close, obtain the corresponding ciphertext of a sub-key;After the sub-key in the cipher key sets obtains, the corresponding ciphertext of true sub-key is sent to receiving terminal.
- 4. the encryption method of anti-DPA attack according to claim 1, it is characterised in that the encrypted algorithm is AES, 3DES, RSA, the close SM1 of state, the close SM2 of state or the close SM4 of state.
- 5. a kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that described program is by processor Following steps are realized during execution:Generate multiple false keys;According to true key and the multiple false key, cipher key sets are obtained;A key is obtained from the cipher key sets successively as encryption key, to being encrypted in plain text, obtains a key Corresponding ciphertext;After the key in the cipher key sets obtains, the corresponding ciphertext of true key is sent to receiving terminal.
- 6. computer-readable recording medium according to claim 5, it is characterised in that the true key storage is posted first In storage, the multiple vacation key storage is in other registers;It is described " to obtain a key from the cipher key sets successively as encryption key, to being encrypted in plain text, obtain described one The corresponding ciphertext of key;After the key in the cipher key sets obtains, the corresponding ciphertext of true key is sent to reception End " is specially:If a key takes out from first register, the corresponding ciphertext of a key is stored to second In register;After the key in the cipher key sets obtains, the ciphertext in the second register is sent to receiving terminal.
- 7. computer-readable recording medium according to claim 5, it is characterised in that the true key includes multiple very sub Key, each vacation key include multiple false sub-keys respectively;It is described " to obtain a key from the cipher key sets successively as encryption key, to being encrypted in plain text, obtain described one The corresponding ciphertext of key;After the key in the cipher key sets obtains, the corresponding ciphertext of true key is sent to reception End " is specially:A true sub-key or a false sub-key are obtained from the cipher key sets successively as encryption key, to adding in plain text It is close, obtain the corresponding ciphertext of a sub-key;After the sub-key in the cipher key sets obtains, the corresponding ciphertext of true sub-key is sent to receiving terminal.
- 8. computer-readable recording medium according to claim 5, it is characterised in that the encrypted algorithm for AES, 3DES, RSA, the close SM1 of state, the close SM2 of state or the close SM4 of state.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/100715 WO2019047062A1 (en) | 2017-09-06 | 2017-09-06 | Anti-dpa attack encryption method and computer-readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107980212A true CN107980212A (en) | 2018-05-01 |
Family
ID=62006181
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201780001940.4A Pending CN107980212A (en) | 2017-09-06 | 2017-09-06 | The encryption method and computer-readable recording medium of anti-DPA attacks |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107980212A (en) |
WO (1) | WO2019047062A1 (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110321737A (en) * | 2019-06-28 | 2019-10-11 | 兆讯恒达微电子技术(北京)有限公司 | A kind of method of the anti-injection attack of data encryption standards coprocessor |
CN111294199A (en) * | 2018-12-06 | 2020-06-16 | 新唐科技股份有限公司 | Encryption/decryption system, encryption device, decryption device, and encryption/decryption method |
US11258579B2 (en) * | 2018-02-26 | 2022-02-22 | Stmicroelectronics (Rousset) Sas | Method and circuit for implementing a substitution table |
US11265145B2 (en) | 2018-02-26 | 2022-03-01 | Stmicroelectronics (Rousset) Sas | Method and device for performing substitution table operations |
CN114531239A (en) * | 2022-04-20 | 2022-05-24 | 广州万协通信息技术有限公司 | Data transmission method and system for multiple encryption keys |
CN115622821A (en) * | 2022-12-20 | 2023-01-17 | 北京佳芯信息科技有限公司 | Encryption communication method and encryption communication system |
US11824969B2 (en) | 2018-02-26 | 2023-11-21 | Stmicroelectronics (Rousset) Sas | Method and circuit for performing a substitution operation |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113468585B (en) * | 2021-09-02 | 2021-11-19 | 国网浙江省电力有限公司营销服务中心 | Encryption method, device and storage medium based on energy key table |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104734842A (en) * | 2015-03-13 | 2015-06-24 | 上海交通大学 | Resisting method of circuit on side channel attack based on pseudo-operation |
CN104734845A (en) * | 2015-03-25 | 2015-06-24 | 上海交通大学 | Side-channel attack protection method based on full-encryption algorithm pseudo-operation |
US9430188B2 (en) * | 2008-12-31 | 2016-08-30 | Stmicroelectronics International N.V. | Method for protecting a cryptographic device against SPA, DPA and time attacks |
-
2017
- 2017-09-06 WO PCT/CN2017/100715 patent/WO2019047062A1/en active Application Filing
- 2017-09-06 CN CN201780001940.4A patent/CN107980212A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9430188B2 (en) * | 2008-12-31 | 2016-08-30 | Stmicroelectronics International N.V. | Method for protecting a cryptographic device against SPA, DPA and time attacks |
CN104734842A (en) * | 2015-03-13 | 2015-06-24 | 上海交通大学 | Resisting method of circuit on side channel attack based on pseudo-operation |
CN104734845A (en) * | 2015-03-25 | 2015-06-24 | 上海交通大学 | Side-channel attack protection method based on full-encryption algorithm pseudo-operation |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11258579B2 (en) * | 2018-02-26 | 2022-02-22 | Stmicroelectronics (Rousset) Sas | Method and circuit for implementing a substitution table |
US11265145B2 (en) | 2018-02-26 | 2022-03-01 | Stmicroelectronics (Rousset) Sas | Method and device for performing substitution table operations |
US11824969B2 (en) | 2018-02-26 | 2023-11-21 | Stmicroelectronics (Rousset) Sas | Method and circuit for performing a substitution operation |
CN111294199A (en) * | 2018-12-06 | 2020-06-16 | 新唐科技股份有限公司 | Encryption/decryption system, encryption device, decryption device, and encryption/decryption method |
CN111294199B (en) * | 2018-12-06 | 2023-05-05 | 新唐科技股份有限公司 | Encryption/decryption system, encryption device, decryption device, and encryption/decryption method |
CN110321737A (en) * | 2019-06-28 | 2019-10-11 | 兆讯恒达微电子技术(北京)有限公司 | A kind of method of the anti-injection attack of data encryption standards coprocessor |
CN110321737B (en) * | 2019-06-28 | 2020-12-11 | 兆讯恒达科技股份有限公司 | Method for preventing injection type attack of data encryption standard coprocessor |
CN114531239A (en) * | 2022-04-20 | 2022-05-24 | 广州万协通信息技术有限公司 | Data transmission method and system for multiple encryption keys |
CN115622821A (en) * | 2022-12-20 | 2023-01-17 | 北京佳芯信息科技有限公司 | Encryption communication method and encryption communication system |
Also Published As
Publication number | Publication date |
---|---|
WO2019047062A1 (en) | 2019-03-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107980212A (en) | The encryption method and computer-readable recording medium of anti-DPA attacks | |
D'souza et al. | Advanced encryption standard (AES) security enhancement using hybrid approach | |
AU2016386405B2 (en) | Fast format-preserving encryption for variable length data | |
Yegireddi et al. | A survey on conventional encryption algorithms of Cryptography | |
CN106788974A (en) | Mask S boxes, packet key computing unit, device and corresponding building method | |
CN103716157A (en) | Grouped multiple-key encryption method and grouped multiple-key encryption device | |
CN105933108B (en) | A kind of pair of SM4 algorithm realizes the method cracked | |
Panda et al. | Plain text encryption using AES, DES and SALSA20 by java based bouncy castle API on Windows and Linux | |
Anwar et al. | Comparative study of cryptography algorithms and its’ applications | |
CN104301095A (en) | DES round operation method and circuit | |
Kaur | A Review on Symmetric Key Cryptography Algorithms. | |
Hu et al. | An effective differential power attack method for advanced encryption standard | |
Ding et al. | Block-oriented correlation power analysis with bitwise linear leakage: An artificial intelligence approach based on genetic algorithms | |
Soomro et al. | Review and open issues of cryptographic algorithms in cyber security | |
Soni et al. | Key generation using genetic algorithm for image encryption | |
Joshi et al. | Implementation of S-Box for advanced encryption standard | |
Saberi et al. | Enhanced key expansion for AES-256 by using even-odd method | |
Lim et al. | Differential fault attack on lightweight block cipher PIPO | |
Qiu et al. | Power analysis of a FPGA implementation of SM4 | |
Li et al. | An improved method of differential fault analysis on the SMS4 cryptosystem | |
Biao et al. | Practical template attacks based on pooled covariance matrix | |
Jain et al. | Honey2fish-a hybrid encryption approach for improved password and message security | |
Jawad et al. | Design and Implementation of Multi-key Blowfish and CAST Algorithm: Comparative Study with CBC, CFB and CTR Modes | |
Mouachi et al. | A Choice of Symmetric Cryptographic Algorithms based on Multi-Criteria Analysis Approach for Securing Smart Grid | |
Shi et al. | A Secure Implementation of a Symmetric Encryption Algorithm in White‐Box Attack Contexts |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180501 |
|
RJ01 | Rejection of invention patent application after publication |