CN107980212A - The encryption method and computer-readable recording medium of anti-DPA attacks - Google Patents

The encryption method and computer-readable recording medium of anti-DPA attacks Download PDF

Info

Publication number
CN107980212A
CN107980212A CN201780001940.4A CN201780001940A CN107980212A CN 107980212 A CN107980212 A CN 107980212A CN 201780001940 A CN201780001940 A CN 201780001940A CN 107980212 A CN107980212 A CN 107980212A
Authority
CN
China
Prior art keywords
key
true
cipher
corresponding ciphertext
sub
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201780001940.4A
Other languages
Chinese (zh)
Inventor
王磊
林岑
柴威荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Landi Commercial Equipment Co Ltd
Original Assignee
Fujian Landi Commercial Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Landi Commercial Equipment Co Ltd filed Critical Fujian Landi Commercial Equipment Co Ltd
Publication of CN107980212A publication Critical patent/CN107980212A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • H04L9/003Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

Encryption method and computer-readable recording medium, method the invention discloses a kind of anti-DPA attacks include:Generate multiple false keys;According to true key and the multiple false key, cipher key sets are obtained;A key is obtained from the cipher key sets successively as encryption key, to being encrypted in plain text, obtains the corresponding ciphertext of a key;After the key in the cipher key sets obtains, the corresponding ciphertext of true key is sent to receiving terminal.As being substantially due to the time of false key and true key computing, energy expenditure and electromagnetic radiation, so that differential power analysis method can not analyze the length for understanding key and true key participates in the time sequencing of computing, the energy spectrometer curve of generation is not fixed, also real key can not be just cracked, so that the security of encryption data be effectively ensured.

Description

The encryption method and computer-readable recording medium of anti-DPA attacks
Technical field
The present invention relates to field of information security technology, more particularly to a kind of encryption method of anti-DPA attacks and computer can Read storage medium.
Background technology
POS machine is among process of exchange, using aes algorithm encrypting plaintext, due to calculating data among AES calculating processes Or the operation of read-write register can produce different energy expenditure changes, DPA (differential power attack) technology is in small-signal bar The bypass message for collecting signal can be analyzed under part, according to when some particular event occurs, encryption device energy expenditure Probability distribution can be different from the feature of Average probability distribution, come analysing energy consumption information, Ke Yishi using statistical method Do not go out correct key.
Defence DPA attacks are using the method for adding mask at present.However, although random value mask can defend DPA Attack, but he must calculate random mask RM and the intermediate variable after mask is handled at the same time, in addition, often wheel calculating all must New mask must be produced and the value of S box look-up tables is recalculated with mask, these calculating not only increase the expense of operation time, It also add extra processor load and storage demand.
The content of the invention
The technical problems to be solved by the invention are:A kind of encryption method of anti-DPA attack is provided and computer-readable is deposited Storage media, can improve enciphered data safety.
In order to solve the above-mentioned technical problem, the technical solution adopted by the present invention is:A kind of encryption method of anti-DPA attacks, Including:
Generate multiple false keys;
According to true key and the multiple false key, cipher key sets are obtained;
A key is obtained from the cipher key sets successively as encryption key, to being encrypted in plain text, obtains described one The corresponding ciphertext of key;
After the key in the cipher key sets obtains, the corresponding ciphertext of true key is sent to receiving terminal.
The invention further relates to a kind of computer-readable recording medium, is stored thereon with computer program, and described program is located Reason device realizes following steps when performing:
Generate multiple false keys;
According to true key and the multiple false key, cipher key sets are obtained;
A key is obtained from the cipher key sets successively as encryption key, to being encrypted in plain text, obtains described one The corresponding ciphertext of key;
After the key in the cipher key sets obtains, the corresponding ciphertext of true key is sent to receiving terminal.
The beneficial effects of the present invention are:By generating multiple false keys, and these false keys are made to join together with true key With cryptographic calculation, be substantially due to the time of false key and true key computing, energy expenditure and electromagnetic radiation as so that it is poor Point Energy Analysis for High can not analyze the length for understanding key and true key participates in the time sequencing of computing, the energy of generation Analysis curve is not fixed, and also can not just crack real key.Encryption method proposed by the invention can not be attacked logical by DPA Extraction feature is crossed to distinguish true and false key, the security of encryption data has been effectively ensured.
Brief description of the drawings
Fig. 1 is a kind of flow chart of the encryption method of anti-DPA attacks of the present invention;
Fig. 2 is the method flow diagram of the embodiment of the present invention one.
Embodiment
The design of most critical of the present invention is:The false key of addition participates in cryptographic calculation so that differential power analysis method without Method cracks real key.
Explanation of nouns:
AES:Advanced Encryption Standard, i.e. Advanced Encryption Stardand, are American National Standard and technology Rijndael algorithms determined by research are simultaneously used as high-level data encryption standard, to substitute original data encryption standards (DES);
Differential power is attacked:Differential Power Analysis (DPA), are a kind of methods by statistics point Analysis a large amount of energy expenditure curves as caused by same key encrypts not isolog, by asking for being averaged for curve in different sets Value discloses key value and encryption device.
Referring to Fig. 1, a kind of encryption method of anti-DPA attacks, including:
Generate multiple false keys;
According to true key and the multiple false key, cipher key sets are obtained;
A key is obtained from the cipher key sets successively as encryption key, to being encrypted in plain text, obtains described one The corresponding ciphertext of key;
After the key in the cipher key sets obtains, the corresponding ciphertext of true key is sent to receiving terminal.
As can be seen from the above description, the beneficial effects of the present invention are:DPA attacks can not be distinguished true and false by extracting feature Key, has been effectively ensured the security of encryption data.
Further, the true key storage is in the first register, and the multiple vacation key storage is in other registers In;
It is described " to obtain a key from the cipher key sets successively as encryption key, to being encrypted in plain text, obtain institute State the corresponding ciphertext of a key;When in the cipher key sets key obtain after, by the corresponding ciphertext of true key send to Receiving terminal " is specially:
If a key takes out from first register, by the corresponding ciphertext of a key store to In second register;
After the key in the cipher key sets obtains, the ciphertext in the second register is sent to receiving terminal.
Seen from the above description, by by true key and false key storage in different registers so that system can be with Quickly and easily distinguish the true and false of key.
Further, the true key includes multiple true sub-keys, and each vacation key includes multiple false sub-keys respectively;
It is described " to obtain a key from the cipher key sets successively as encryption key, to being encrypted in plain text, obtain institute State the corresponding ciphertext of a key;When in the cipher key sets key obtain after, by the corresponding ciphertext of true key send to Receiving terminal " is specially:
A true sub-key or a false sub-key are obtained from the cipher key sets successively as encryption key, plaintext is carried out Encryption, obtains the corresponding ciphertext of a sub-key;
After the sub-key in the cipher key sets obtains, the corresponding ciphertext of true sub-key is sent to receiving terminal.
Seen from the above description, method of the invention is suitable for block encryption computing.
Further, the encrypted algorithm is AES, 3DES, RSA, the close SM1 of state, the close SM2 of state or the close SM4 of state.
Seen from the above description, method of the invention is suitable for multiple encryption algorithms.
The present invention also proposes a kind of computer-readable recording medium, is stored thereon with computer program, described program is located Reason device realizes following steps when performing:
Generate multiple false keys;
According to true key and the multiple false key, cipher key sets are obtained;
A key is obtained from the cipher key sets successively as encryption key, to being encrypted in plain text, obtains described one The corresponding ciphertext of key;
After the key in the cipher key sets obtains, the corresponding ciphertext of true key is sent to receiving terminal.
Further, the true key storage is in the first register, and the multiple vacation key storage is in other registers In;
It is described " to obtain a key from the cipher key sets successively as encryption key, to being encrypted in plain text, obtain institute State the corresponding ciphertext of a key;When in the cipher key sets key obtain after, by the corresponding ciphertext of true key send to Receiving terminal " is specially:
If a key takes out from first register, by the corresponding ciphertext of a key store to In second register;
After the key in the cipher key sets obtains, the ciphertext in the second register is sent to receiving terminal.
Further, the true key includes multiple true sub-keys, and each vacation key includes multiple false sub-keys respectively;
It is described " to obtain a key from the cipher key sets successively as encryption key, to being encrypted in plain text, obtain institute State the corresponding ciphertext of a key;When in the cipher key sets key obtain after, by the corresponding ciphertext of true key send to Receiving terminal " is specially:
A true sub-key or a false sub-key are obtained from the cipher key sets successively as encryption key, plaintext is carried out Encryption, obtains the corresponding ciphertext of a sub-key;
After the sub-key in the cipher key sets obtains, the corresponding ciphertext of true sub-key is sent to receiving terminal.
Further, the encrypted algorithm is AES, 3DES, RSA, the close SM1 of state, the close SM2 of state or the close SM4 of state.
Embodiment one
Fig. 2 is refer to, the embodiment of the present invention one is:A kind of encryption method of anti-DPA attacks, can be applied to POS machine, wraps Include following steps:
S1:Generate multiple false keys;Wherein, 3-5 false key can be generated according to true key, this 3-5 false key is every The fixed key that secondary start produces, remaining false key is to start to encrypt caused random cipher every time.
S2:According to true key and the multiple false key, cipher key sets are obtained;Will true key and false key be blended in one Rise, true key is randomly dispersed among false key, its position uses random distribution, and position is not fixed;But in order to enable the system to True key and false key are rapidly and accurately distinguished, can be by true key storage in the first register, by multiple false key storages In other registers.
S3:A key is obtained from the cipher key sets successively as encryption key, to being encrypted in plain text, is obtained described The corresponding ciphertext of one key.
S4:Judge whether a key takes out from first register, if so, then performing step S5.By True key is only stored in the first register without storing false key, therefore, if a key is taken from the first register Go out, then it represents that the key is true key.
S5:The corresponding ciphertext of one key is stored into the second register.False key is needed to being encrypted in plain text Computing, but its obtained ciphertext is not sent to receiving terminal, simply allows it to participate in the process of computations, produces energy expenditure letter Breath.Therefore, the corresponding ciphertext of true key ciphertext corresponding with false key is rapidly distinguished for convenience, true key is corresponding close Text is separately stored with the corresponding ciphertext of vacation key, will the corresponding ciphertext of true key individually stored.
S6:After the key in the cipher key sets obtains, the corresponding ciphertext of true key is sent to receiving terminal, i.e., Ciphertext in second register is sent to receiving terminal.
Further, the true key includes multiple true sub-keys, and each vacation key includes multiple false sub-keys respectively;Example Such as, the encryption key of AES is 128, can be divided into 16 sub-keys, each sub-key 8.Therefore, can be random by true sub-key It is distributed among false sub-key, likewise, true sub-key is stored in the first register, false sub-key is stored in other posts In storage.
In step s3, i.e., a true sub-key is obtained from the cipher key sets successively or a false sub-key is close as encrypting Key, to being encrypted in plain text, obtains the corresponding ciphertext of a sub-key, and the corresponding ciphertext of true sub-key then is stored in In two registers, finally after the sub-key in cipher key sets obtains, the corresponding ciphertext of true sub-key is sent to reception End, i.e., send the ciphertext in the second register to receiving terminal.
Further, the method for the present embodiment is applicable to AES, 3DES, RSA, the close SM1 of state, the close SM2 of state, the close SM4 of state etc. Encryption Algorithm.
The present embodiment makes these false keys participate in cryptographic calculation together with true key by generating multiple false keys, by As time, energy expenditure in false key and true key computing with electromagnetic radiation is substantially so that differential power analysis side Method can not analyze the length for understanding key and true key participates in the time sequencing of computing, and the energy spectrometer curve of generation is not solid It is fixed, it also can not just crack real key.The security of encryption data has been effectively ensured.
Embodiment two
The present embodiment is a kind of computer-readable recording medium of corresponding above-described embodiment, is stored thereon with computer journey Sequence, realizes following steps when described program is executed by processor:
Generate multiple false keys;
According to true key and the multiple false key, cipher key sets are obtained;
A key is obtained from the cipher key sets successively as encryption key, to being encrypted in plain text, obtains described one The corresponding ciphertext of key;
After the key in the cipher key sets obtains, the corresponding ciphertext of true key is sent to receiving terminal.
Further, the true key storage is in the first register, and the multiple vacation key storage is in other registers In;
It is described " to obtain a key from the cipher key sets successively as encryption key, to being encrypted in plain text, obtain institute State the corresponding ciphertext of a key;When in the cipher key sets key obtain after, by the corresponding ciphertext of true key send to Receiving terminal " is specially:
If a key takes out from first register, by the corresponding ciphertext of a key store to In second register;
After the key in the cipher key sets obtains, the ciphertext in the second register is sent to receiving terminal.
Further, the true key includes multiple true sub-keys, and each vacation key includes multiple false sub-keys respectively;
It is described " to obtain a key from the cipher key sets successively as encryption key, to being encrypted in plain text, obtain institute State the corresponding ciphertext of a key;When in the cipher key sets key obtain after, by the corresponding ciphertext of true key send to Receiving terminal " is specially:
A true sub-key or a false sub-key are obtained from the cipher key sets successively as encryption key, plaintext is carried out Encryption, obtains the corresponding ciphertext of a sub-key;
After the sub-key in the cipher key sets obtains, the corresponding ciphertext of true sub-key is sent to receiving terminal.
Further, the encrypted algorithm is AES, 3DES, RSA, the close SM1 of state, the close SM2 of state or the close SM4 of state.
In conclusion the encryption method and computer-readable recording medium of a kind of anti-DPA attacks provided by the invention, pass through Multiple false keys are generated, and these false keys is participated in cryptographic calculation together with true key, due to false key and true key computing Time, as energy expenditure and electromagnetic radiation be substantially so that differential power analysis method, which can not be analyzed, understands key Length and true key participate in the time sequencing of computing, and the energy spectrometer curve of generation is not fixed, and also can not just crack true Key.Encryption method proposed by the invention can not be attacked by DPA and true and false key is distinguished by extracting feature, effectively be protected The security of encryption data is demonstrate,proved.

Claims (8)

  1. A kind of 1. encryption method of anti-DPA attacks, it is characterised in that including:
    Generate multiple false keys;
    According to true key and the multiple false key, cipher key sets are obtained;
    A key is obtained from the cipher key sets successively as encryption key, to being encrypted in plain text, obtains a key Corresponding ciphertext;
    After the key in the cipher key sets obtains, the corresponding ciphertext of true key is sent to receiving terminal.
  2. 2. the encryption method of anti-DPA attacks according to claim 1, it is characterised in that the true key storage is first In register, the multiple vacation key storage is in other registers;
    It is described " to obtain a key from the cipher key sets successively as encryption key, to being encrypted in plain text, obtain described one The corresponding ciphertext of key;After the key in the cipher key sets obtains, the corresponding ciphertext of true key is sent to reception End " is specially:
    If a key takes out from first register, the corresponding ciphertext of a key is stored to second In register;
    After the key in the cipher key sets obtains, the ciphertext in the second register is sent to receiving terminal.
  3. 3. the encryption method of anti-DPA attacks according to claim 1, it is characterised in that the true key includes multiple true Sub-key, each vacation key include multiple false sub-keys respectively;
    It is described " to obtain a key from the cipher key sets successively as encryption key, to being encrypted in plain text, obtain described one The corresponding ciphertext of key;After the key in the cipher key sets obtains, the corresponding ciphertext of true key is sent to reception End " is specially:
    A true sub-key or a false sub-key are obtained from the cipher key sets successively as encryption key, to adding in plain text It is close, obtain the corresponding ciphertext of a sub-key;
    After the sub-key in the cipher key sets obtains, the corresponding ciphertext of true sub-key is sent to receiving terminal.
  4. 4. the encryption method of anti-DPA attack according to claim 1, it is characterised in that the encrypted algorithm is AES, 3DES, RSA, the close SM1 of state, the close SM2 of state or the close SM4 of state.
  5. 5. a kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that described program is by processor Following steps are realized during execution:
    Generate multiple false keys;
    According to true key and the multiple false key, cipher key sets are obtained;
    A key is obtained from the cipher key sets successively as encryption key, to being encrypted in plain text, obtains a key Corresponding ciphertext;
    After the key in the cipher key sets obtains, the corresponding ciphertext of true key is sent to receiving terminal.
  6. 6. computer-readable recording medium according to claim 5, it is characterised in that the true key storage is posted first In storage, the multiple vacation key storage is in other registers;
    It is described " to obtain a key from the cipher key sets successively as encryption key, to being encrypted in plain text, obtain described one The corresponding ciphertext of key;After the key in the cipher key sets obtains, the corresponding ciphertext of true key is sent to reception End " is specially:
    If a key takes out from first register, the corresponding ciphertext of a key is stored to second In register;
    After the key in the cipher key sets obtains, the ciphertext in the second register is sent to receiving terminal.
  7. 7. computer-readable recording medium according to claim 5, it is characterised in that the true key includes multiple very sub Key, each vacation key include multiple false sub-keys respectively;
    It is described " to obtain a key from the cipher key sets successively as encryption key, to being encrypted in plain text, obtain described one The corresponding ciphertext of key;After the key in the cipher key sets obtains, the corresponding ciphertext of true key is sent to reception End " is specially:
    A true sub-key or a false sub-key are obtained from the cipher key sets successively as encryption key, to adding in plain text It is close, obtain the corresponding ciphertext of a sub-key;
    After the sub-key in the cipher key sets obtains, the corresponding ciphertext of true sub-key is sent to receiving terminal.
  8. 8. computer-readable recording medium according to claim 5, it is characterised in that the encrypted algorithm for AES, 3DES, RSA, the close SM1 of state, the close SM2 of state or the close SM4 of state.
CN201780001940.4A 2017-09-06 2017-09-06 The encryption method and computer-readable recording medium of anti-DPA attacks Pending CN107980212A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/100715 WO2019047062A1 (en) 2017-09-06 2017-09-06 Anti-dpa attack encryption method and computer-readable storage medium

Publications (1)

Publication Number Publication Date
CN107980212A true CN107980212A (en) 2018-05-01

Family

ID=62006181

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201780001940.4A Pending CN107980212A (en) 2017-09-06 2017-09-06 The encryption method and computer-readable recording medium of anti-DPA attacks

Country Status (2)

Country Link
CN (1) CN107980212A (en)
WO (1) WO2019047062A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110321737A (en) * 2019-06-28 2019-10-11 兆讯恒达微电子技术(北京)有限公司 A kind of method of the anti-injection attack of data encryption standards coprocessor
CN111294199A (en) * 2018-12-06 2020-06-16 新唐科技股份有限公司 Encryption/decryption system, encryption device, decryption device, and encryption/decryption method
US11258579B2 (en) * 2018-02-26 2022-02-22 Stmicroelectronics (Rousset) Sas Method and circuit for implementing a substitution table
US11265145B2 (en) 2018-02-26 2022-03-01 Stmicroelectronics (Rousset) Sas Method and device for performing substitution table operations
CN114531239A (en) * 2022-04-20 2022-05-24 广州万协通信息技术有限公司 Data transmission method and system for multiple encryption keys
CN115622821A (en) * 2022-12-20 2023-01-17 北京佳芯信息科技有限公司 Encryption communication method and encryption communication system
US11824969B2 (en) 2018-02-26 2023-11-21 Stmicroelectronics (Rousset) Sas Method and circuit for performing a substitution operation

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113468585B (en) * 2021-09-02 2021-11-19 国网浙江省电力有限公司营销服务中心 Encryption method, device and storage medium based on energy key table

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104734842A (en) * 2015-03-13 2015-06-24 上海交通大学 Resisting method of circuit on side channel attack based on pseudo-operation
CN104734845A (en) * 2015-03-25 2015-06-24 上海交通大学 Side-channel attack protection method based on full-encryption algorithm pseudo-operation
US9430188B2 (en) * 2008-12-31 2016-08-30 Stmicroelectronics International N.V. Method for protecting a cryptographic device against SPA, DPA and time attacks

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9430188B2 (en) * 2008-12-31 2016-08-30 Stmicroelectronics International N.V. Method for protecting a cryptographic device against SPA, DPA and time attacks
CN104734842A (en) * 2015-03-13 2015-06-24 上海交通大学 Resisting method of circuit on side channel attack based on pseudo-operation
CN104734845A (en) * 2015-03-25 2015-06-24 上海交通大学 Side-channel attack protection method based on full-encryption algorithm pseudo-operation

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11258579B2 (en) * 2018-02-26 2022-02-22 Stmicroelectronics (Rousset) Sas Method and circuit for implementing a substitution table
US11265145B2 (en) 2018-02-26 2022-03-01 Stmicroelectronics (Rousset) Sas Method and device for performing substitution table operations
US11824969B2 (en) 2018-02-26 2023-11-21 Stmicroelectronics (Rousset) Sas Method and circuit for performing a substitution operation
CN111294199A (en) * 2018-12-06 2020-06-16 新唐科技股份有限公司 Encryption/decryption system, encryption device, decryption device, and encryption/decryption method
CN111294199B (en) * 2018-12-06 2023-05-05 新唐科技股份有限公司 Encryption/decryption system, encryption device, decryption device, and encryption/decryption method
CN110321737A (en) * 2019-06-28 2019-10-11 兆讯恒达微电子技术(北京)有限公司 A kind of method of the anti-injection attack of data encryption standards coprocessor
CN110321737B (en) * 2019-06-28 2020-12-11 兆讯恒达科技股份有限公司 Method for preventing injection type attack of data encryption standard coprocessor
CN114531239A (en) * 2022-04-20 2022-05-24 广州万协通信息技术有限公司 Data transmission method and system for multiple encryption keys
CN115622821A (en) * 2022-12-20 2023-01-17 北京佳芯信息科技有限公司 Encryption communication method and encryption communication system

Also Published As

Publication number Publication date
WO2019047062A1 (en) 2019-03-14

Similar Documents

Publication Publication Date Title
CN107980212A (en) The encryption method and computer-readable recording medium of anti-DPA attacks
D'souza et al. Advanced encryption standard (AES) security enhancement using hybrid approach
AU2016386405B2 (en) Fast format-preserving encryption for variable length data
Yegireddi et al. A survey on conventional encryption algorithms of Cryptography
CN106788974A (en) Mask S boxes, packet key computing unit, device and corresponding building method
CN103716157A (en) Grouped multiple-key encryption method and grouped multiple-key encryption device
CN105933108B (en) A kind of pair of SM4 algorithm realizes the method cracked
Panda et al. Plain text encryption using AES, DES and SALSA20 by java based bouncy castle API on Windows and Linux
Anwar et al. Comparative study of cryptography algorithms and its’ applications
CN104301095A (en) DES round operation method and circuit
Kaur A Review on Symmetric Key Cryptography Algorithms.
Hu et al. An effective differential power attack method for advanced encryption standard
Ding et al. Block-oriented correlation power analysis with bitwise linear leakage: An artificial intelligence approach based on genetic algorithms
Soomro et al. Review and open issues of cryptographic algorithms in cyber security
Soni et al. Key generation using genetic algorithm for image encryption
Joshi et al. Implementation of S-Box for advanced encryption standard
Saberi et al. Enhanced key expansion for AES-256 by using even-odd method
Lim et al. Differential fault attack on lightweight block cipher PIPO
Qiu et al. Power analysis of a FPGA implementation of SM4
Li et al. An improved method of differential fault analysis on the SMS4 cryptosystem
Biao et al. Practical template attacks based on pooled covariance matrix
Jain et al. Honey2fish-a hybrid encryption approach for improved password and message security
Jawad et al. Design and Implementation of Multi-key Blowfish and CAST Algorithm: Comparative Study with CBC, CFB and CTR Modes
Mouachi et al. A Choice of Symmetric Cryptographic Algorithms based on Multi-Criteria Analysis Approach for Securing Smart Grid
Shi et al. A Secure Implementation of a Symmetric Encryption Algorithm in White‐Box Attack Contexts

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180501

RJ01 Rejection of invention patent application after publication