US20200244434A1 - Differential power analysis resistant encryption and decryption functions - Google Patents
Differential power analysis resistant encryption and decryption functions Download PDFInfo
- Publication number
- US20200244434A1 US20200244434A1 US16/387,286 US201916387286A US2020244434A1 US 20200244434 A1 US20200244434 A1 US 20200244434A1 US 201916387286 A US201916387286 A US 201916387286A US 2020244434 A1 US2020244434 A1 US 2020244434A1
- Authority
- US
- United States
- Prior art keywords
- block
- key
- blocks
- decryption
- fpga
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 230000006870 function Effects 0.000 title description 19
- 238000000034 method Methods 0.000 claims abstract description 25
- 238000000638 solvent extraction Methods 0.000 claims 1
- 238000006467 substitution reaction Methods 0.000 abstract description 11
- 238000010586 diagram Methods 0.000 description 23
- 230000002087 whitening effect Effects 0.000 description 19
- 238000013459 approach Methods 0.000 description 6
- 210000004027 cell Anatomy 0.000 description 6
- 238000012986 modification Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 238000013461 design Methods 0.000 description 2
- 230000000873 masking effect Effects 0.000 description 2
- 238000004549 pulsed laser deposition Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 210000003126 m-cell Anatomy 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000007619 statistical method Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/003—Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0637—Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/16—Obfuscation or hiding, e.g. involving white box
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
Definitions
- This invention relates to methods and systems for securing the programming data of a programmable device—e.g., a field-programmable gate array (FPGA) or other programmable logic device (PLD)—against power analysis attacks, and to a programmable device so secured.
- a programmable device e.g., a field-programmable gate array (FPGA) or other programmable logic device (PLD)—against power analysis attacks, and to a programmable device so secured.
- FPGA field-programmable gate array
- PLD programmable logic device
- Programmable devices are well known.
- each device has a large number of logic gates, and a user programs the device to assume a particular configuration of those logic gates, typically by receiving configuration data from a configuration device.
- Configuration data has become increasingly complex in modern PLDs.
- proprietary configuration data for various commonly-used functions (frequently referred to as “intellectual property cores”) have been sold either by device manufacturers or third parties, freeing the original customer from having to program those functions on its own. If a party provides such proprietary configuration data, it may want to protect this data from being read, as well as any internal data that may reveal the configuration data.
- Cryptographic algorithms may provide one or more classes of encryption/decryption schemes for securing the configuration data. However, these cryptographic algorithms may be vulnerable to specific kinds of attacks.
- One type of attack on an encryption/decryption cryptographic system in a device is known as a power analysis attack. This approach involves observing the power consumption of the device while it is executing a cryptographic algorithm. An attacker can combine the data derived from observing the power consumption of the device with the knowledge of the specific operations that are executed during the cryptographic algorithm, and thereby deduce information about keys and other secret data of the cryptographic algorithm.
- DPA Differential Power Analysis
- Different elements of a cryptographic algorithm may be particularly vulnerable to DPA attacks.
- key scheduling routines used for generating multiple sub-keys for multiple cryptographic rounds from a secret cipher key may be especially vulnerable in this regard, given that these routines manipulate the cipher key in a known way.
- substitution tables also referred to as substitution boxes or “S-boxs”
- S-boxs substitution boxes
- the initial round of encryption or final round of decryption of some cryptographic algorithms may be particularly vulnerable to DPA attacks, because they may only involve key manipulation without modification of plaintext or ciphertext.
- the present invention relates to systems and methods for protecting a programmable device against Differential Power Analysis attacks.
- an encryption or decryption system may generate cryptographic key schedules by using different cipher keys for each block.
- a first cipher key may be derived as a function of a second cipher key and of one of a previous block of plaintext, a previous block of ciphertext, or an output of a linear feedback shift register (LFSR) associated with the previous block of plaintext.
- LFSR linear feedback shift register
- the encryption or decryption system may expand (i.e., evolve) round keys between encryption and/or decryption blocks.
- a key expansion block may generate from a cipher key a first sequence of round keys for decrypting a first block of ciphertext such that each round key is generated based on at least one preceding round key in the first sequence.
- the key expansion block may generate from at least one of the round keys of the first sequence a second sequence of round keys for decrypting a second block of ciphertext.
- the initial round key for decrypting a second block of plaintext is set to the final round key used for decrypting a first block of ciphertext.
- the sequence of decryption round keys may be inverted to generate a sequence of encryption round keys.
- the encryption or decryption cryptographic system that implements the cryptographic algorithm is configurable to use obfuscated substitution S-boxes.
- S-boxes may be obfuscated by interleaving data to be encrypted (or decrypted) with random data.
- the random data may be true random (e.g., generated by a True Random Number Generator).
- the random data may be pseudo-random (e.g., generated by a linear feedback shift register).
- the random data may be related to another cryptographic operation for an unrelated block of data.
- plaintext may be obfuscated, e.g., through whitening using an LFSR.
- Blocks of plaintext may be obfuscated before encryption using chained encryption blocks.
- a block of obfuscated plaintext may be further obfuscated with a block of ciphertext output from the encryption of a preceding block of plaintext.
- blocks of ciphertext may be further obfuscated with blocks of obfuscated plaintext.
- blocks of ciphertext may be obfuscated with blocks of obfuscated plaintext before decryption using chained decryption blocks.
- Blocks of decrypted data may be combined with blocks of ciphertext to generate blocks of obfuscated plaintext.
- blocks of obfuscated plaintext may be processed with an LFSR to output corresponding blocks of plaintext.
- FIG. 1 is an exemplary block diagram of a programmable device in which embodiments of the present invention may be implemented
- FIG. 2A is an exemplary block diagram of a whitening system for obfuscating blocks of plaintext according to an embodiment of the present invention
- FIG. 2B is an exemplary block diagram of an unwhitening system for unwhitening blocks of obfuscated plaintext according to an embodiment of the present invention
- FIG. 3A is an exemplary block diagram for an encryption system implementing AES with continuously evolving cryptographic keys according to some embodiments
- FIG. 3B is an exemplary block diagram representing the continuous evolution of cryptographic keys in a decryption system according to some embodiments
- FIG. 3C is an exemplary block diagram representing the continuous evolution of cryptographic keys in an encryption system according to some embodiments.
- FIG. 4 is an exemplary block diagram of a system for obfuscating a cryptographic substitution box according to some embodiments
- FIG. 5A is an exemplary block diagram of an encryption system for encrypting data according to some embodiments.
- FIG. 5B is an exemplary block diagram of a decryption system for decrypting data according to some embodiments
- FIG. 6 is an exemplary block diagram of an illustrative decryption system for decrypting data employing a programmable logic device according to some embodiments
- FIG. 7A is an exemplary block diagram of an encryption system for encrypting data according to some embodiments.
- FIG. 7B is an exemplary block diagram of a decryption system for decrypting data according to some embodiments.
- FIG. 8 is an exemplary block diagram of an illustrative decryption system for decrypting data employing a programmable logic device according to some embodiments
- FIG. 9 shows an exemplary flowchart of a process for encrypting data according to some embodiments.
- FIG. 10 shows an exemplary flowchart of a process for decrypting data according to some embodiments.
- FIG. 1 shows an exemplary block diagram of a programmable logic device 100 as an example of a programmable device in which embodiments of the present invention may be implemented.
- the external memory 120 contains configuration data, typically containing proprietary designs, that is used to configure the functionality of the logic device 100 .
- the configuration of logic device 100 may occur upon powering up the device, rebooting, or at some other re-programming time. For example, upon powering up, the configuration data will be sent from the external memory 120 to the logic device 100 .
- the configuration data may be encrypted in order to prevent copying when the data is in transit, e.g., using an encryption system (not shown).
- the encrypted data is sent to the logic device 100 where it is decrypted by a decoder 102 .
- the decrypted data is then stored in configuration data memory 104 .
- the configuration data is used to configure the functionality of logic blocks 106 .
- the logic blocks may start operating on input data.
- the logic blocks may store internal data, e.g., in data registers, RAM, or other suitable storage. This internal data may reflect specific aspects of the configuration data. Additionally, in non-programmable devices, the internal data may reflect proprietary aspects of the circuit design which may be desired to be kept secret.
- the configuration data (which will be referred to herein as plaintext) may be encrypted using an encryption cryptographic system that implements a cryptographic algorithm.
- the decoder 102 may then decrypt the encrypted data (i.e., ciphertext) using a corresponding decryption cryptographic system that implements the cryptographic algorithm.
- AES Advanced Encryption Standard
- plaintext (e.g., configuration data received in a configuration device for configuring programmable logic device 100 of FIG. 1 ) may be processed prior to encryption with a cryptographic algorithm. This may increase the security of the cryptographic algorithm. For instance, blocks of plaintext may be obfuscated prior to encrypting these blocks with AES.
- FIG. 2A shows an exemplary block diagram of whitening system 200 that could be used to carry out plaintext obfuscation according to an embodiment of the present invention.
- Whitening system 200 may include a linear feedback shift register (LFSR) 204 coupled to combining circuitry 208 .
- LFSR linear feedback shift register
- combining circuitry 208 may be implemented as an exclusive-OR gate. In some implementations, combining circuitry 208 may include multiplicative and/or inversion elements. Although the remainder of the patent specification will refer to the exclusive-OR gate implementation of combining circuitry 208 , it should be understood that the invention described herein is applicable to other combining functions as well. As such, discussing the embodiments with respect to the exclusive-OR is exemplary and not intended to limit the scope of the present invention.
- Plaintext data P (e.g., configuration data) may be partitioned into N blocks of M bits each, e.g., P 1 , P 2 , P 3 , . . . , and P N .
- Combining circuitry 208 is coupled to LFSR 204 .
- LFSR 204 may be implemented as an M-cell shift register.
- an input bit e.g., a bit from combining circuitry 208
- each bit in LFSR 204 may shift down one cell.
- the bit in the last cell of LFSR 204 may be shifted out at output 206 as an output bit.
- the bits output at output 206 will be referred to as output bitstream L.
- bits may be fed back to the LFSR through feedback lines 211 , 212 , and/or 213 , such that they are combined with one or more of bits in predetermined cells of the LFSR (called taps).
- This feedback causes the bits output by LFSR 204 at output 206 to cycle through a set of unique values that may appear random, i.e., a set of pseudo-random values.
- the arrangement of taps for feedback in the LFSR (i.e., the bits in the LFSR cells that influence the output as described above) can be expressed as a feedback polynomial, where the powers of the terms represent the tapped bits.
- bits in cells 99 , 62 , and 33 may be combined to produce the output bit in the next stage.
- the output of the LFSR may be viewed as a division by the characteristic polynomial POLY.
- the initial value with which the LFSR is initialized determines the operation of the register and may be viewed as a random seed that initializes the LFSR pseudo-random generation.
- Blocks of plaintext P i may be input into the initialized LFSR through combining circuitry 208 .
- Combining circuitry 208 may combine the output of the LFSR with the block of plaintext P i to generate a block of obfuscated plaintext P′ i at output 210 .
- the block of plaintext P i may be XORed with the output of the LFSR to generate the block of obfuscated plaintext P′ i .
- Such an operation is referred to as whitening the block of plaintext P i .
- POLY represents the feedback polynomial of LFSR 204
- P 1 ⁇ . . . ⁇ P N represents a concatenation (e.g., using the concatenation symbol II) of the blocks of plaintext P i input at 202
- E ⁇ 1 K0 (0) represents the value used to initialize LFSR 204
- L 1 ⁇ . . . ⁇ L N represents a concatenation of the blocks of output bits in output bitstream L.
- Output bitstream L and plaintext P may be combined to generate obfuscated or whitened plaintext P′ as follows:
- LFSR 204 The operation of LFSR 204 may be described using the following incremental equations:
- R i ( R i ⁇ 1 ⁇ P i )MOD POLY, (EQ. 1d)
- the first two equations correspond to initializing the LFSR by setting the initial value contained in the LFSR R 0 and the first block of output bits L 0 .
- R 0 may be set to a block of mask values generated from decrypting a vector of predetermine values (e.g., all zeros) using cipher key K 0 . In this way, even if the vector of predetermined values is predictable, the value obtained by decrypting the vector of predetermined values using cipher key K 0 is still unknown to the attacker.
- L 0 may be set to a vector of all zeros. It should be understood that these initialization values of R 0 and L 0 are merely exemplary and that R 0 and L 0 may be initialized to any other suitable value.
- EQS. 1c and 1d describe the operation of the LFSR, and in particular, how the output bitstream L i and the LFSR state R i are updated.
- the operation of the LFSR may be viewed as performing division of the value contained in the LFSR R i ⁇ 1 by the feedback polynomial POLY to generate output bitstream block L i .
- the value contained in the LFSR R i may be expressed as the result of concatenating the previous LFSR block (or state) R i ⁇ 1 with a current block of plaintext P i and taking the modulo polynomial POLY to generate the current LFSR state R i .
- FIG. 2B is an exemplary block diagram of an unwhitening system for unwhitening blocks of obfuscated plaintext according to an embodiment of the present invention.
- This system may be viewed as the counterpart of FIG. 2A and comprises LFSR 254 and combining circuitry 258 .
- Blocks of obfuscated plaintext P′ are input into the LFSR 254 and combining circuitry 258 .
- Combining circuitry 258 combines obfuscated plaintext P′ and the output bitstream L to generate unwhitened plaintext P.
- Blocks of obfuscated plaintext P′ 1 , . . . , P′ N may be input into LFSR 254 and combining circuitry 258 .
- LFSR 254 may operate similarly to LFSR 204 of FIG. 2A above.
- the operation of unwhitening system 250 of FIG. 2B may be expressed as follows:
- R i ( R i ⁇ 1 ⁇ P i )MOD POLY
- the first three equations are similar to EQS. 1b, 1c, and 1d above, and describe the initialization and operation of LFSR 258 .
- the last equation describes the operation of combining circuitry 258 to generate unwhitened plaintext P from XORing output bitstream block L i and obfuscated plaintext block P′ i .
- Whitening may increase security against DPA by masking the first round of AES encryption (or the last round of the AES block decryption). Given that these rounds are particularly vulnerable to DPA attacks, and given that they operate on the key without modification of plaintext or ciphertext, the plaintext obfuscation discussed above may increase the security of the device against DPA attacks.
- blocks of plaintext, P i , or blocks of obfuscated plaintext, P′ i may be input to an AES encryption system.
- FIG. 3A is an exemplary block diagram of an encryption system 300 for encrypting plaintext (obfuscated or not) using AES with a cipher key K.
- This cipher key K 306 may be uploaded into the engine system and/or stored in the engine system.
- Encryption system 300 may include a block 302 for receiving and/or storing plaintext, a block 380 for receiving and/or storing corresponding ciphertext, and an encryption block 304 that implements encryption function E K ( ).
- Encryption block 304 may receive a block of plaintext (P i or P′ i ) and generate a corresponding block of ciphertext based on cipher key K.
- a block of plaintext P i or obfuscated plaintext P′ i may be input into block 302 .
- An initial key mix operation 330 may be performed in which the plaintext block is XORed with an initial round key 310 . In normal AES, this initial key is generated from a first portion of the cipher key K. This initial key mix operation provides the starting data for the first round 340 .
- a round key for one block may be used to generate a round key of another block. This will be described in more detail below.
- a data block is transformed using S-box substitution 342 , row shifting 344 , and column mixing 346 , (b) round key 312 is generated in key expansion block 308 , and (c) the transformed data block and round key 312 are added together using an XOR operation in the AddRoundKey 348 operation to provide the starting data block for the next round.
- Similar operations are repeated for each l th round 350 of AES (i.e., for each of the 14 rounds for AES256) with the exception that the column mixing operation is omitted in the final round 360 .
- the details of the S-box substitution, row shifting, and column mixing operations for the rounds are described in the above-mentioned NIST document.
- a sequence of round keys for each encryption round is generated from the initial cipher key K using a key expansion routine, e.g., implemented by block 308 .
- the words of the cipher key are used as is for generating the first round keys, then each successive round key word is a function of one or more of the preceding round key words. This generating of each successive round key word based on at least one of the preceding round key words will be referred to herein as the evolution of round keys.
- AES256 encryption and decryption for a particular block evolve the round keys in reverse order. If the fourteen decryption round keys for block 1 are R 1 l through R l 14 , then the encryption round keys for block 1 will be R 1 14 through R 1 1 .
- the cipher key used for encrypting subsequent blocks of plaintext or obfuscated plaintext is different with every block. This is different from normal AES where the same key schedule based on the same cipher key K is used for every block and the initial round key (i.e., round key 310 ) used in the first round of AES for every block is filled from the first words of the cipher key K.
- encrypting a first block of plaintext P 1 (or P′ 1 ) may use the same sequence of 14 round keys (or key schedule) as normal AES based on the original cipher key K.
- encrypting a second block of plaintext P 2 (or P′ 2 ) may use a different key schedule. For example, a sequence of round keys for encrypting P 2 may be based on expanding an initial round key that is different from the one used for P 1 .
- every block may be encrypted using a different key such that the keys for encrypting subsequent blocks of plaintext are related.
- the round keys for encrypting different blocks of plaintext may continue to evolve between blocks.
- the key used for encrypting a block of plaintext or obfuscated plaintext may be derived based on a function of the previous plaintext, the previous ciphertext, the previous key used to encrypt the previous plaintext or decrypt the previous ciphertext, and/or the previous LFSR value used to whiten the previous plaintext or unwhiten the previous ciphertext.
- FIG. 3B is an exemplary block diagram representing the continuous evolution of cryptographic keys in a decryption system according to some embodiments.
- each row may correspond to one cryptographic round and each column may correspond to one block of ciphertext.
- 14 decryption rounds and three blocks are illustrated.
- Each box depicts a decryption round key R n l that may be used to decrypt block n during round l.
- the decryption keys of each column form a sequence of keys associated with one block of ciphertext. As explained above in connection with key expansion block 308 of FIG.
- a decryption round key R n l+1 may be derived from a decryption round key of a previous round, e.g., R n l .
- the relationship between the decryption round keys associated with one block may be expressed using a function f l ( ) where l refers to the decryption round.
- This function f l ( ) may describe the intra-block round key evolution used from decryption round key R n1 to decryption round key R n l+1 .
- R n l+1 f(R n l ) because f l ( ) is the same, regardless of round l).
- the even and odd rounds have different functions because the even and odd round keys are a function of the upper and lower 128 bits of the cipher key K.
- Other types of block ciphers may have different functions for each round.
- the decryption round key for a block n may depend on the value of a decryption round key for a previous block n ⁇ 1.
- the first round decryption key for block n may be derived from the last round decryption key used for block n ⁇ 1.
- f 14 ( ) is not strictly defined (as the key is evolved, i.e., expanded, only 13 times to get 14 round keys, and the key of the first round key for the second block is regenerated from cipher key K, i.e., similarly to the first round key for the first block).
- f 14 ( ) may be defined to be equal to the decryption key evolution function of the last even round, i.e., f 12 ( ).
- the encryption keys may not be practical to evolve the encryption keys from the last block to the first block in order to starting encrypting the first block. For example, it may not be practical to start from R 3 14 to compute R 1 1 by sequentially applying f ⁇ 1 l ( ), per the order illustrated in FIG. 3 . Instead of computing the encryption round keys backwards from the last block to the first block, the 14 encryption round keys R n 14 , . . . , R n 1 may be obtained by first expanding the 14 decryption round keys R n 1 , . . . , R n 14 . In other words, each sequence of encryption round keys associated with block n (i.e., R n 14 , . . .
- R n 1 may be computed by generating the corresponding sequence of decryption round keys (i.e., R n 1 , . . . , R n 14 , as described in FIG. 3B above), and then inverting the order of the generated sequence of decryption round keys.
- key schedule routines are specifically vulnerable to DPA attacks.
- an attacker may generate two large sets of ciphertext blocks and monitor the power consumption of a device while the device decrypts both sets of ciphertexts.
- Statistical analysis of the difference in power consumption between both sets may help derive information about the cipher key.
- the techniques described above of letting the round keys continue to evolve between block encryptions may increase the security of the device against these types of attacks because the keys used to decrypt the ciphertexts may vary with each block.
- the intra-block key evolution approach described in FIGS. 3A-3C above may be applied to cipher block modes of operation e.g. Counter Mode (CTR) or Cipher-Block-Chaining mode (CBC).
- CTR Counter Mode
- CBC Cipher-Block-Chaining mode
- the evolving key approach may be combined with any other DPA resistant methods and systems such as the ones described herein.
- FIG. 4 is an exemplary block diagram of system 400 for obfuscating a cryptographic substitution box according to an embodiment of the present invention.
- System 400 includes S-box 206 , which may be implemented in hardware or software on an encryption device, e.g., on a PLD or an encryption system in configuration device.
- An S-box is a typical component of symmetric key cryptographic algorithms that is used to obscure the relationship between the key and the data to be encrypted or decrypted.
- the S-box may be implemented as a table lookup that is indexed by a combination of key bits and plaintext. For example, each byte of input text 202 may be replaced with another byte 208 according to the look up table and using the cipher key K.
- S-boxes may be vulnerable to DPA attacks.
- An attacker may control the plaintext values and make guesses at the key bits. Based on these guesses, computations are performed on the monitored power consumption to form a set of DPA data. The DPA data is analyzed to determine with of the key bit guesses was likely correct. These types of attacks may be mitigated by obfuscating S-boxes used, for example, during AES.
- S-box 206 may be obfuscated by interleaving input data 202 with random data 204 .
- This random data may not be part of the plaintext or ciphertext.
- random data 204 may be true random, e.g., generated by a true random number generator (TRNG) implemented in an FPGA.
- TRNG true random number generator
- random data 204 may be pseudo-random, e.g., generated with an LFSR similar to LFSR 204 from FIG. 2 .
- random data 204 may be generated from a separate cryptographic method operating on an unrelated block of data.
- FIG. 5A shows an exemplary block diagram of encryption system 500 for encrypting data according to some embodiments.
- Encryption system 500 may include encryption blocks 506 , 516 , 526 , and 536 . These encryption blocks may be implemented as encryption block 300 of FIG. 3A , using normal AES or AES modified to use continuously evolving keys.
- System 500 may also include combining circuitries 502 , 512 , 522 , 532 , 504 , 514 , 524 , 534 , 508 , 518 , 528 , and 538 . Each one of these combining circuitries may be implemented similarly to combining circuitry 208 of FIG. 2A . It should be noted that the number of encryption blocks and the number of combining circuitries are exemplary and not intended to limit the scope of the present invention.
- Blocks of plaintext P 1 , P 2 , P 3 , and P 4 are whitened using whitening bistream blocks L 1 , L 2 , L 3 , and L 4 .
- These whitening bistream blocks may be generated using an LFSR as described in FIG. 2A above.
- the plaintext blocks and whitening bistream blocks are combined using combining circuitries 502 , 512 , 522 , and 532 to output blocks of obfuscated plaintext P′ 1 , P′ 2 , P′ 3 , and P′ 4 .
- the first block of plaintext P 1 may be set to an initialization vector (IV).
- An IV is a fixed-size seed input to a cryptographic mode that is typically random or pseudorandom. For block ciphers, the use of an IV randomizes the encryption and hence produces distinct ciphertexts even if the same plaintext (P 2 , P 3 , . . . ) is encrypted multiple times.
- the blocks of obfuscated plaintext P′ 1 , P′ 2 , P′ 3 , and P′ 4 are further obfuscated by combining them, respectively, with blocks of ciphertext C 0 , C 1 , C 2 , and C 3 using combining circuitries 504 , 514 , 524 , and 534 .
- ciphertext block C 0 may be initialized to zero, or to any other suitable value.
- Ciphertext blocks C 1 , C 2 , and C 3 are output from encryption blocks 506 , 516 , and 526 , respectively, as will be discussed below.
- the blocks resulting from combining the blocks of obfuscated plaintext and the blocks of ciphertext are referred to as blocks of further obfuscated plaintext H 1 , H 2 , H 3 , and H 4 .
- Blocks H 1 , H 2 , H 3 , and H 4 are encrypted using encryption blocks 506 , 516 , 526 , and 536 to generate ciphertext blocks C 1 , C 2 , C 3 , and C 4 .
- encryption blocks 506 , 516 , 526 , and 536 may use different cipher keys K 1 , K 2 , K 3 , and K 4 .
- the keys K 1 , K 2 , K 3 , and K 4 may be obtained using the evolving key approach described in FIGS. 3A-C above.
- This block of mask values may be generated by decrypting a vector of all zeros using cipher key K 0 .
- This first block of obfuscated ciphertext C′ 1 may thus be expressed as C 1 XOR H 0 .
- the block of ciphertext C 1 is combined with the second block of obfuscated plaintext P′ 2 using combining circuitry 514 .
- the output of combining circuitry 514 , H 2 is fed into the second encryption block 516 .
- Combining circuitry 518 combines the first block of further obfuscated plaintext H 1 with the second block of ciphertext C 2 to generate a second block of obfuscated ciphertext C′ 2 .
- the operation of combining circuitry 518 may be viewed as whitening the block of ciphertext C 2 with the prior block of further obfuscated plaintext H 1 to output the block of obfuscated ciphertext C′ 2 .
- Similar operations may be repeated to generate a third block and fourth block of ciphertext C 3 and C 4 and a third block and fourth block of obfuscated ciphertext C′ 3 and C′ 4 .
- R i ( R i ⁇ 1 ⁇ P 1 )MOD POLY, (EQ. 1d)
- the first set of equations, EQS. 1a, 1b, 1c, and 1d is the same as the incremental LFSR equations of FIG. 2A and corresponds to the generation of bitstream blocks L 1 , L 2 , L 3 , and L 4 .
- the second set of equations, EQS. 2a, 2b, and 2c corresponds to initialization values for the inputs of combining circuitries 504 , 508 , and 502 , respectively.
- 3a, 3b, 3c, and 3d represents the relation between blocks of plaintext P i , blocks of obfuscated plaintext P′ i , blocks of further obfuscated plaintext H i , blocks of ciphertext C i , and blocks of obfuscated ciphertext C′ i , as described above.
- the initialization values are merely illustrative, and that any suitable value may be used to initialize L 0 , R 0 , H 0 , C 0 and P 1 .
- the blocks of obfuscated ciphertext output by encryption system 500 may be decrypted using decryption system 550 illustrated in FIG. 5B .
- Decryption system 550 may include decryption blocks 554 , 564 , 574 , and 584 , and combining circuitries 552 , 562 , 572 , 582 , 556 , 566 , 576 , 586 , 558 , 568 , 578 , and 588 . These combining circuitries may be implemented similarly to combining circuitry 208 of FIG. 2A . It should be noted that the number of decryption blocks and the number of combining circuitries are exemplary and not intended to limit the scope of the present invention.
- Blocks of obfuscated ciphertext C′ 1 , C′ 2 , C′ 3 , and C′ 4 are fed into decryption system 550 . These blocks of obfuscated ciphertext may for example have been output from encryption system 500 of FIG. 5A .
- the block of mask values may be generated similarly to FIG. 5A , i.e., by decrypting a vector of all zeros using cipher key K 0 .
- First decryption block 554 decrypts ciphertext block C 1 with cipher key K 1 to produce a first block of further obfuscated plaintext H 1 .
- the first block of further obfuscated plaintext H 1 may be combined with a block of ciphertext C 0 using combining circuitry 556 .
- the output of the combining circuitry 556 corresponds to obfuscated plaintext block P′ 1 .
- This block of obfuscated plaintext P′ 1 may be unwhitened with bistream block L 1 to generate a block of plaintext P 1 .
- the bistream block L 1 may be generated by an LFSR such as the one depicted in FIG. 2B .
- the block of further obfuscated plaintext H 1 is combined with obfuscated ciphertext block C′ 2 using combining circuitry 562 to generate a block of ciphertext C 2 .
- This block of ciphertext C 2 is decrypted using decryption block 564 to generate H 2 .
- Block H 2 is combined with ciphertext block C 1 to generate obfuscated plaintext block P′ 2 .
- This block of obfuscated plaintext P′ 2 may be unwhitened similarly to P′ 1 in order to generate plaintext block P 2 .
- decryption system 550 may be summarized using the following equations:
- R i ( R i ⁇ 1 ⁇ P i )MOD POLY, (EQ. 4c)
- the first set of equations, EQS. 4a, 4b, and 4c is the same as the incremental LFSR equations of FIG. 2B and corresponds to the generation of bitstream blocks L 1 , L 2 , L 3 , and L 4 .
- the second set of equations, EQS. 5a and 5b corresponds to initialization values for the inputs of combining circuitries 552 and 556 , respectively.
- 6a, 6b, 6c, and 6d represents the relation between blocks of obfuscated ciphertext C′ i , blocks of ciphertext C 1 , blocks of further obfuscated plaintext H 1 , blocks of obfuscated plaintext P′ i , and blocks of plaintext P i , as described above.
- These equations are the reverse of the encryption equations 3a, 3b, 3c, and 3d above.
- the initialization values are merely illustrative, and that any suitable value may be used to initialize R 0 , H 0 , and C 0 .
- these cipher keys may be the same or different.
- these keys may be different and may be generated using the evolving key approach described in FIGS. 3A-C above.
- Decryption system 600 of FIG. 6 may include M-bit shift registers 604 and 618 , M-bit linear feedback shift register (LFSR) 640 , decryption engine 614 , registers 608 and 609 , and combining circuitries 610 , 616 , and 644 .
- LFSR 640 may be implemented similarly to LFSR 204 of FIG. 2B .
- Combining circuitries 610 , 616 , and 644 may be implemented similarly to combining circuitry 208 of FIG. 2A .
- Combining circuitry 610 may receive a first block of obfuscated ciphertext C′ i+1 from shift register 604 and combine it with an output of decryption engine 614 to generate a corresponding block of ciphertext C i+1 .
- the output of combining circuitry 610 is coupled to the decryption engine 614 .
- Decryption engine 614 may decrypt the first block of ciphertext C i+1 to output a first block of further obfuscated plaintext H i , e.g., as specified in EQ. 6a above.
- the block of further obfuscated plaintext H i may be fed back to combining circuitry 610 to generate the corresponding block of ciphertext C i+1 , e.g., as specified in EQ. 6b above.
- the output of combining circuitry 610 may also be coupled to serially connected registers 608 and 609 , for storing the previous two generated ciphertext blocks C i and C i+1 , respectively.
- Combining circuitry 616 may combine the block of ciphertext output by register 609 (e.g., C i ⁇ 1 ) with the block of further obfuscated plaintext H i to output a block of obfuscated plaintext P′ i , as specified in EQ. 6c above.
- the block of obfuscated plaintext P′ i may be input into shift register 618 , which is coupled to combing circuitry 644 and LFSR 640 .
- Combining circuitry 644 and LFSR 640 are arranged similarly to system 250 of FIG. 2B above, and are configurable to unwhiten the block of obfuscated plaintext P′ i to generate a block of plaintext P i , e.g., as described in EQ. 6d above.
- the feedback line 620 from the output of decryption engine 614 to the input of combining circuitry 610 may be selectively disabled. By disabling this feedback line, decryption engine 614 may implement decryption algorithm using normal CBC mode (i.e., without whitening obfuscated ciphertext blocks with prior plaintext blocks H i .)
- the techniques of obfuscating plaintext and ciphertext described above may help make a device more secure against DPA.
- DPA attacks may be prevented on the first and last round of a single block decryption, which are typically the most vulnerable rounds.
- the attacker may be prevented from injecting multiple known ciphertext blocks with varying different bits, because all subsequent ciphertext blocks would be cryptographically corrupted.
- an attacker may toggle bits of only one ciphertext block, C′ 1 , in a known fashion, and analyze the power profiles of the device while the device decrypts a large number of ciphertexts differing in this one ciphertext block C′ i .
- changing one ciphertext block would propagate across all following ciphertext blocks, which would make this type of attack substantially more difficult.
- decryption engine 614 may decrypt each block C i using the same cipher key K.
- decryption engine 614 may implement continuously evolving key as described in FIGS. 3A-C above. For example, decryption engine 614 may expand cipher key K from one block to the next. For instance, the first round key in decrypting ciphertext block C 2 may be initialized to the value of the final round key used in decrypting ciphertext block C 1 .
- AES decryption engine 614 may implement the S-box obfuscation described in FIG. 4 above. In some implementations, decryption engine 614 may implement the AES algorithm using 4 S-boxes that are obfuscated as described in FIG. 4 above, e.g., using true random or pseudo-random data.
- FIGS. 7A, 7B, and 8 are variants of the encryption and decryption systems illustrated in FIGS. 5A, 5B, and 6 , respectively.
- FIG. 7A is an exemplary block diagram of an encryption system 700 for encrypting data according to some embodiments.
- System 700 may operate similar to system 500 of FIG. 5A , except that ciphertext blocks C i are obfuscated with blocks of obfuscated plaintext P′ i ⁇ 1 , instead of with blocks of further obfuscated plaintext H i ⁇ 1 as is the case in system 500 .
- combining circuitry 718 is coupled to an output of combining circuitry 702 through line 710 .
- combining circuitry 518 is coupled to an output of combining circuitry 504 through line 510 .
- system 700 may be described using equations similar to system 500 , with EQS. 2a and 3 d modified as follows:
- the value P′ 0 of EQ. 2a′ corresponds to the initialization value for the input of combining circuitry 708 . It should be noted that this initialization value is merely illustrative, and that any suitable value may be used to initialize P′ 0 .
- the obfuscation of ciphertext blocks using previous obfuscated plaintext blocks is shown in EQ. 3d′.
- FIG. 7B is an exemplary block diagram of a decryption system 750 for decrypting data according to some embodiments.
- System 750 may operate similar to system 550 of FIG. 5B , except that obfuscated ciphertext blocks C′ i are unwhitened with blocks of obfuscated plaintext P′ i ⁇ 1 , instead of with blocks of further obfuscated plaintext H i ⁇ 1 as is the case in system 550 .
- combining circuitry 762 is coupled to an output of combining circuitry 756 through line 760 .
- combining circuitry 562 is coupled to an output of decryption block 554 through line 560 .
- system 750 may be described using equations similar to system 550 , with EQS. 5a and 6 a modified as follows:
- the value P′ 0 of EQ. 5a′ corresponds to the 2a′ corresponds to the initialization value for the input of combining circuitry 756 . It should be noted that this initialization value is merely illustrative, and that any suitable value may be used to initialize P′ 0 .
- the unwhitening of obfuscated ciphertext blocks using previous obfuscated plaintext blocks is shown in EQ. 6a′.
- FIG. 8 An illustrative implementation of the decryption system of FIG. 7B is shown in FIG. 8 .
- System 800 of FIG. 8 may operate similar to system 600 of FIG. 6 , except that feedback line 820 connects an output of combining circuitry 818 to combining circuitry 810 .
- feedback line 620 connects the output of the decryption engine to combining circuitry 610 .
- This modification reflects EQ. 6a′ above, such that blocks of obfuscated ciphertext are unwhitened using previous blocks of obfuscated plaintext P′ i , rather than previous blocks of further obfuscated plaintext H i .
- FIG. 9 shows an exemplary flowchart of process 900 for encrypting data in accordance with some embodiments.
- Process 900 may be executed, for example, in a system for encrypting configuration data that may be external or internal to a programmable device.
- plaintext is received, for example, configuration data for configuring PLD 100 of FIG. 1 is received at the encryption system.
- plaintext obfuscation it is determined whether plaintext obfuscation is enabled. For example, a bit register in the configuration device may be set to enable or disable this feature. In some embodiments, plaintext obfuscation may always be enabled. If plaintext obfuscation is enabled, then plaintext is whitened at step 906 , for example, as described in FIG. 2A above. Step 908 may then be performed. Alternatively, if plaintext obfuscation is disabled, then 908 may be immediately performed.
- a bit register in the configuration device may be set to enable or disable allowing the key to continue to evolve in between blocks. This may be useful for users who want to implement AES strictly according to the NIST standard, i.e., by generating round keys for each block encryption starting from the cipher key. If continuous key evolution is not enabled, then 912 may be performed. Alternatively, if at 908 key evolution mode is enabled, then 910 may be performed.
- plaintext (or obfuscated plaintext from 906 if plaintext whitening is enabled) is encrypted with such that different blocks are encrypted with different keys, as described in connection with FIGS. 3A-C above.
- plaintext (or obfuscated plaintext from 906 if plaintext whitening is enabled) is encrypted using normal AES, i.e., using the original cipher key for generating the sequence of round keys (key schedule).
- S-box obfuscation it is determined whether S-box obfuscation is enabled. For example, a bit register in the configuration device may be set to enable or disable this feature. Given that obfuscating cryptographic S-boxes may add computational overhead, a user may wish to disable this feature in some implementations.
- plaintext is encrypted at 916 using obfuscated S-boxes as described in connection with FIG. 4 above, where plaintext is input into the obfuscated S-box. If S-box obfuscation is disabled, plaintext is encrypted at 918 using non-obfuscated S-boxes, such as the normal AES S-boxes.
- encryption is carried out by whitening output blocks of ciphertext with blocks of plaintext (that may have been whitened or not at 906 ). This may be implemented using encryption system 500 of FIG. 5A or encryption 700 of FIG. 7A .
- the normal cryptographic method e.g., AES encryption
- normal CBC mode e.g., AES CBC mode
- FIG. 10 shows an exemplary flowchart of process 1000 for decrypting data in accordance with some embodiments.
- Process 1000 may be executed, for example, in a system for decrypting configuration data in a programmable device, e.g., decoder 102 of programmable logic device 100 of FIG. 1 .
- ciphertext is received, for example, encrypted configuration data for configuring PLD 100 of FIG. 1 is received at the decryption system, or ciphertext output by encryption process 900 of FIG. 9 .
- ciphertext obfuscation it is determined whether ciphertext obfuscation is enabled. For example, feedback lines 620 of FIG. 6 or 820 of FIG. 8 may be enabled in this case. If ciphertext obfuscation is enabled, 1006 may be performed. Otherwise, 1008 may be performed.
- decryption is carried out by whitening ciphertext with blocks of plaintext. This may be implemented using decryption systems 550 of FIG. 5B, 600 of FIG. 6, 750 of FIG. 7B , or 800 of FIG. 8 .
- the normal cryptographic method e.g., AES decryption
- the normal cryptographic method may be implemented using normal CBC mode. For example, feedback lines 620 of FIG. 6 or 820 of FIG. 8 may be disabled in this case.
- S-box obfuscation it is determined whether S-box obfuscation is enabled. If S-box obfuscation is enabled, ciphertext is decrypted at 1012 using obfuscated S-boxes as described in connection with FIG. 4 above, where ciphertext is input into the obfuscated S-box. Otherwise, if S-box obfuscation is disabled, ciphertext is decrypted using non-obfuscated S-boxes at 1014 , such as the normal AES S-boxes.
- ciphertext is decrypted with a continuously evolving key, as described in connection with FIGS. 3A-B .
- different cipher keys may be used to decrypt different blocks.
- decryption of a subsequent block may use round keys that have been expanded from the key schedule of a previous block decryption.
- plaintext obfuscation it is determined whether plaintext obfuscation is enabled. If plaintext obfuscation is enabled, then whitened plaintext is whitened at step 1024 , for example, as described in FIG. 2B above. In particular, whitening blocks of whitened plaintext using LFSR 254 and combining circuitry 258 of FIG. 2B may generate corresponding blocks of plaintext.
- plaintext (e.g., corresponding to configuration data) that corresponds to ciphertext received at 1002 is output.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
Circuits, methods, and systems are provided for securing an integrated circuit device against Differential Power Analysis (DPA) attacks. Plaintext (e.g., configuration data for a programmable device) may be encrypted in an encryption system using a cryptographic algorithm. Ciphertext may be decrypted in a decryption system using the cryptographic algorithm. The encryption and/or decryption systems may obfuscate the plaintext, the ciphertext, and/or the substitution tables used by the cryptographic algorithm. The encryption and/or decryption systems may also generate cryptographic key schedules by using different keys for encrypting/decrypting different blocks and/or by expanding round keys between encryption/decryption blocks. These techniques may help mitigate or altogether eliminate the vulnerability of cryptographic elements revealing power consumption information to learn the value of secret information, e.g., through DPA.
Description
- This invention relates to methods and systems for securing the programming data of a programmable device—e.g., a field-programmable gate array (FPGA) or other programmable logic device (PLD)—against power analysis attacks, and to a programmable device so secured.
- Programmable devices are well known. In one class of known PLDs, each device has a large number of logic gates, and a user programs the device to assume a particular configuration of those logic gates, typically by receiving configuration data from a configuration device. Configuration data has become increasingly complex in modern PLDs. As such, proprietary configuration data for various commonly-used functions (frequently referred to as “intellectual property cores”) have been sold either by device manufacturers or third parties, freeing the original customer from having to program those functions on its own. If a party provides such proprietary configuration data, it may want to protect this data from being read, as well as any internal data that may reveal the configuration data.
- Commonly-assigned U.S. Pat. Nos. 5,768,372, and 5,915,017, each of which is hereby incorporated by reference herein in its respective entirety, describe the encryption of the configuration data and its decryption upon loading into the programmable device, including provision of an indicator to signal to the decryption circuit which of several possible encryption/decryption schemes was used to encrypt the configuration data and therefore should be used to decrypt the configuration data. Commonly-assigned U.S. Pat. No. 7,479,798, which is hereby incorporated by reference herein in its entirety, describes a disabling element that can be used to selectively disable a reading of a data from a device.
- Cryptographic algorithms may provide one or more classes of encryption/decryption schemes for securing the configuration data. However, these cryptographic algorithms may be vulnerable to specific kinds of attacks. One type of attack on an encryption/decryption cryptographic system in a device is known as a power analysis attack. This approach involves observing the power consumption of the device while it is executing a cryptographic algorithm. An attacker can combine the data derived from observing the power consumption of the device with the knowledge of the specific operations that are executed during the cryptographic algorithm, and thereby deduce information about keys and other secret data of the cryptographic algorithm.
- One type of power analysis attack is known as a Differential Power Analysis (“DPA”) (see, for example, “Introduction to Differential Power Analysis and Related Attacks”, by Paul Kocher et al., of Cryptography Research, San Francisco, Calif., copyright 1998, reprinted at web site: www.cryptography.com). DPA involves observing the power consumption of a device while it executes cryptographic operations for a large number of varying inputs. By collecting and statistically correlating data from these multiple observations, an attacker can derive secret information for the cryptographic operations carried out by the device.
- Different elements of a cryptographic algorithm may be particularly vulnerable to DPA attacks. For example, key scheduling routines, used for generating multiple sub-keys for multiple cryptographic rounds from a secret cipher key may be especially vulnerable in this regard, given that these routines manipulate the cipher key in a known way. In addition, substitution tables (also referred to as substitution boxes or “S-boxs”), which are common in cryptographic algorithms and often implemented as look up tables, may also be vulnerable to DPA attacks. Also, the initial round of encryption or final round of decryption of some cryptographic algorithms may be particularly vulnerable to DPA attacks, because they may only involve key manipulation without modification of plaintext or ciphertext.
- The present invention relates to systems and methods for protecting a programmable device against Differential Power Analysis attacks.
- Therefore, in accordance with embodiments of the present invention, an encryption or decryption system may generate cryptographic key schedules by using different cipher keys for each block. In some implementations, a first cipher key may be derived as a function of a second cipher key and of one of a previous block of plaintext, a previous block of ciphertext, or an output of a linear feedback shift register (LFSR) associated with the previous block of plaintext. In some implementations, the encryption or decryption system may expand (i.e., evolve) round keys between encryption and/or decryption blocks. A key expansion block may generate from a cipher key a first sequence of round keys for decrypting a first block of ciphertext such that each round key is generated based on at least one preceding round key in the first sequence. The key expansion block may generate from at least one of the round keys of the first sequence a second sequence of round keys for decrypting a second block of ciphertext. In some implementations, the initial round key for decrypting a second block of plaintext is set to the final round key used for decrypting a first block of ciphertext. The sequence of decryption round keys may be inverted to generate a sequence of encryption round keys.
- In some embodiments, the encryption or decryption cryptographic system that implements the cryptographic algorithm, e.g., on a programmable device, is configurable to use obfuscated substitution S-boxes. S-boxes may be obfuscated by interleaving data to be encrypted (or decrypted) with random data. In some implementations, the random data may be true random (e.g., generated by a True Random Number Generator). In some implementations, the random data may be pseudo-random (e.g., generated by a linear feedback shift register). In some implementations, the random data may be related to another cryptographic operation for an unrelated block of data.
- In some embodiments, plaintext may be obfuscated, e.g., through whitening using an LFSR. Blocks of plaintext may be obfuscated before encryption using chained encryption blocks. In some implementations, a block of obfuscated plaintext may be further obfuscated with a block of ciphertext output from the encryption of a preceding block of plaintext. In some implementations, blocks of ciphertext may be further obfuscated with blocks of obfuscated plaintext.
- In some embodiments, blocks of ciphertext may be obfuscated with blocks of obfuscated plaintext before decryption using chained decryption blocks. Blocks of decrypted data may be combined with blocks of ciphertext to generate blocks of obfuscated plaintext. In some implementations, blocks of obfuscated plaintext may be processed with an LFSR to output corresponding blocks of plaintext.
- Further features of the invention, its nature and various advantages will be apparent upon consideration of the following detailed description, taken in conjunction with the accompanying drawings, in which like reference characters refer to like parts throughout, and in which:
-
FIG. 1 is an exemplary block diagram of a programmable device in which embodiments of the present invention may be implemented; -
FIG. 2A is an exemplary block diagram of a whitening system for obfuscating blocks of plaintext according to an embodiment of the present invention; -
FIG. 2B is an exemplary block diagram of an unwhitening system for unwhitening blocks of obfuscated plaintext according to an embodiment of the present invention; -
FIG. 3A is an exemplary block diagram for an encryption system implementing AES with continuously evolving cryptographic keys according to some embodiments; -
FIG. 3B is an exemplary block diagram representing the continuous evolution of cryptographic keys in a decryption system according to some embodiments; -
FIG. 3C is an exemplary block diagram representing the continuous evolution of cryptographic keys in an encryption system according to some embodiments; -
FIG. 4 is an exemplary block diagram of a system for obfuscating a cryptographic substitution box according to some embodiments; -
FIG. 5A is an exemplary block diagram of an encryption system for encrypting data according to some embodiments; -
FIG. 5B is an exemplary block diagram of a decryption system for decrypting data according to some embodiments; -
FIG. 6 is an exemplary block diagram of an illustrative decryption system for decrypting data employing a programmable logic device according to some embodiments; -
FIG. 7A is an exemplary block diagram of an encryption system for encrypting data according to some embodiments; -
FIG. 7B is an exemplary block diagram of a decryption system for decrypting data according to some embodiments; -
FIG. 8 is an exemplary block diagram of an illustrative decryption system for decrypting data employing a programmable logic device according to some embodiments; -
FIG. 9 shows an exemplary flowchart of a process for encrypting data according to some embodiments; and -
FIG. 10 shows an exemplary flowchart of a process for decrypting data according to some embodiments. -
FIG. 1 shows an exemplary block diagram of aprogrammable logic device 100 as an example of a programmable device in which embodiments of the present invention may be implemented. Theexternal memory 120 contains configuration data, typically containing proprietary designs, that is used to configure the functionality of thelogic device 100. The configuration oflogic device 100 may occur upon powering up the device, rebooting, or at some other re-programming time. For example, upon powering up, the configuration data will be sent from theexternal memory 120 to thelogic device 100. The configuration data may be encrypted in order to prevent copying when the data is in transit, e.g., using an encryption system (not shown). - The encrypted data is sent to the
logic device 100 where it is decrypted by adecoder 102. The decrypted data is then stored inconfiguration data memory 104. The configuration data is used to configure the functionality of logic blocks 106. After configuration, the logic blocks may start operating on input data. When in operation, the logic blocks may store internal data, e.g., in data registers, RAM, or other suitable storage. This internal data may reflect specific aspects of the configuration data. Additionally, in non-programmable devices, the internal data may reflect proprietary aspects of the circuit design which may be desired to be kept secret. - In some embodiments, the configuration data (which will be referred to herein as plaintext) may be encrypted using an encryption cryptographic system that implements a cryptographic algorithm. The
decoder 102 may then decrypt the encrypted data (i.e., ciphertext) using a corresponding decryption cryptographic system that implements the cryptographic algorithm. - One common cryptographic algorithm is a symmetric key block cipher algorithm adopted by the Department of Commerce, National Institute of Standards and Technology (NIST) as its Advanced Encryption Standard (AES). (See detailed specification in “Federal Information Processing Standards Publication 197” (FIPS 197), of Nov. 26, 2001.) The AES algorithm uses cryptographic keys of 128, 192 and 256 bits to encrypt and decrypt data in blocks of 128 bits. The algorithm iterates a number of nearly identical rounds depending on key length and block size. AES128 uses 10 rounds, AES192 uses 12 rounds and AES256 uses 14 rounds to complete an encryption or decryption operation.
- Although the remainder of this specification will mainly discuss the AES embodiment, it should be understood that embodiments of the invention described herein are applicable to other key lengths and block sizes as well as to other cryptographic algorithms and modes of operation. As such, discussing the embodiments with respect to AES cryptographic algorithm is exemplary and not intended to limit the scope of the present invention.
- In some embodiments, plaintext (e.g., configuration data received in a configuration device for configuring
programmable logic device 100 ofFIG. 1 ) may be processed prior to encryption with a cryptographic algorithm. This may increase the security of the cryptographic algorithm. For instance, blocks of plaintext may be obfuscated prior to encrypting these blocks with AES.FIG. 2A shows an exemplary block diagram ofwhitening system 200 that could be used to carry out plaintext obfuscation according to an embodiment of the present invention.Whitening system 200 may include a linear feedback shift register (LFSR) 204 coupled to combiningcircuitry 208. - In some implementations, combining
circuitry 208 may be implemented as an exclusive-OR gate. In some implementations, combiningcircuitry 208 may include multiplicative and/or inversion elements. Although the remainder of the patent specification will refer to the exclusive-OR gate implementation of combiningcircuitry 208, it should be understood that the invention described herein is applicable to other combining functions as well. As such, discussing the embodiments with respect to the exclusive-OR is exemplary and not intended to limit the scope of the present invention. - Plaintext data P (e.g., configuration data) may be partitioned into N blocks of M bits each, e.g., P1, P2, P3, . . . , and PN. For example, according to AES, P may be partitioned into blocks of M=128 bits. Each block of plaintext Pi (i=1, . . . , N) may be fed into
input 202 of combiningcircuitry 208. - Combining
circuitry 208 is coupled toLFSR 204. In some embodiments,LFSR 204 may be implemented as an M-cell shift register. During each cycle of data transfer, an input bit, e.g., a bit from combiningcircuitry 208, may be fed into a first cell ofLFSR 204, and each bit inLFSR 204 may shift down one cell. The bit in the last cell ofLFSR 204 may be shifted out atoutput 206 as an output bit. The bits output atoutput 206 will be referred to as output bitstream L. These bits may be fed back to the LFSR throughfeedback lines LFSR 204 atoutput 206 to cycle through a set of unique values that may appear random, i.e., a set of pseudo-random values. - In some embodiments, the arrangement of taps for feedback in the LFSR (i.e., the bits in the LFSR cells that influence the output as described above) can be expressed as a feedback polynomial, where the powers of the terms represent the tapped bits. In an illustrative implementation,
LFSR 204 may be implemented as a 128-bit register with a characteristic feedback polynomial POLY=X128+X99+X62+X33+1. According to this implementation, bits in cells 99, 62, and 33 may be combined to produce the output bit in the next stage. The output of the LFSR may be viewed as a division by the characteristic polynomial POLY. - Because the operation of an LFSR is deterministic, the initial value with which the LFSR is initialized determines the operation of the register and may be viewed as a random seed that initializes the LFSR pseudo-random generation. In the embodiment illustrated in
FIG. 2A , and referring to the ith value contained in the LFSR as Ri, a first block R0=E−1 K0(0) may be used to initializeLFSR 204. Because a secret key K0 is used to generate R0, the random seed that initializes the LFSR pseudo-random generation is still unknown to the attacker. - Blocks of plaintext Pi (i=1, . . . , N) may be input into the initialized LFSR through combining
circuitry 208. Combiningcircuitry 208 may combine the output of the LFSR with the block of plaintext Pi to generate a block of obfuscated plaintext P′i atoutput 210. For example, the block of plaintext Pi may be XORed with the output of the LFSR to generate the block of obfuscated plaintext P′i. Such an operation is referred to as whitening the block of plaintext Pi. - Overall, the operation of
whitening system 200 ofFIG. 2A may be expressed as follows: -
(L 1 ∥ . . . ∥L N)=(E −1 K0(0)∥P 1 ∥ . . . ∥P N)DIV POLY, - where POLY represents the feedback polynomial of
LFSR 204, P1∥ . . . ∥PN represents a concatenation (e.g., using the concatenation symbol II) of the blocks of plaintext Pi input at 202, E−1 K0(0) represents the value used to initializeLFSR 204, and L1∥ . . . ∥LN represents a concatenation of the blocks of output bits in output bitstream L. Output bitstream L and plaintext P may be combined to generate obfuscated or whitened plaintext P′ as follows: -
(P′ 1 ∥ . . . ∥P′ N)=(P 1 ∥ . . . ∥P N)XOR(L 1 ∥ . . . ∥L N). - The operation of
LFSR 204 may be described using the following incremental equations: -
L 0=0, (EQ. 1a) -
R 0 =E −1 K0(0), (EQ. 1b) -
L i=(R i−1∥0)DIV POLY, (EQ. 1c) -
R i=(R i−1 ∥P i)MOD POLY, (EQ. 1d) - where i=1, . . . , N.
- The first two equations (EQS. 1a and 1b) correspond to initializing the LFSR by setting the initial value contained in the LFSR R0 and the first block of output bits L0. As explained above, R0 may be set to a block of mask values generated from decrypting a vector of predetermine values (e.g., all zeros) using cipher key K0. In this way, even if the vector of predetermined values is predictable, the value obtained by decrypting the vector of predetermined values using cipher key K0 is still unknown to the attacker. In some implementations, L0 may be set to a vector of all zeros. It should be understood that these initialization values of R0 and L0 are merely exemplary and that R0 and L0 may be initialized to any other suitable value.
- The latter two equations (EQS. 1c and 1d) describe the operation of the LFSR, and in particular, how the output bitstream Li and the LFSR state Ri are updated. As explained above, the operation of the LFSR may be viewed as performing division of the value contained in the LFSR Ri−1 by the feedback polynomial POLY to generate output bitstream block Li. As blocks of plaintext Pi are input into the
LFSR 204, the value contained in the LFSR Ri may be expressed as the result of concatenating the previous LFSR block (or state) Ri−1 with a current block of plaintext Pi and taking the modulo polynomial POLY to generate the current LFSR state Ri. -
FIG. 2B is an exemplary block diagram of an unwhitening system for unwhitening blocks of obfuscated plaintext according to an embodiment of the present invention. This system may be viewed as the counterpart ofFIG. 2A and comprisesLFSR 254 and combiningcircuitry 258. Blocks of obfuscated plaintext P′ are input into theLFSR 254 and combiningcircuitry 258. Combiningcircuitry 258 combines obfuscated plaintext P′ and the output bitstream L to generate unwhitened plaintext P. - Blocks of obfuscated plaintext P′1, . . . , P′N may be input into
LFSR 254 and combiningcircuitry 258.LFSR 254 may operate similarly toLFSR 204 ofFIG. 2A above. The operation ofunwhitening system 250 ofFIG. 2B may be expressed as follows: -
R 0 =E −1 K0(0), -
L i=(R i−1∥0)DIV POLY, -
R i=(R i−1 ∥P i)MOD POLY, and -
P i =L iXORP′ i, - where i=1, . . . , N. The first three equations are similar to EQS. 1b, 1c, and 1d above, and describe the initialization and operation of
LFSR 258. The last equation describes the operation of combiningcircuitry 258 to generate unwhitened plaintext P from XORing output bitstream block Li and obfuscated plaintext block P′i. - Whitening (or unwhitening) the plaintext, as illustrated in
FIGS. 2A and 2B above, may increase security against DPA by masking the first round of AES encryption (or the last round of the AES block decryption). Given that these rounds are particularly vulnerable to DPA attacks, and given that they operate on the key without modification of plaintext or ciphertext, the plaintext obfuscation discussed above may increase the security of the device against DPA attacks. - In some embodiments, blocks of plaintext, Pi, or blocks of obfuscated plaintext, P′i, e.g., as output by whitening
system 200 ofFIG. 2A , may be input to an AES encryption system.FIG. 3A is an exemplary block diagram of anencryption system 300 for encrypting plaintext (obfuscated or not) using AES with a cipher key K. This cipherkey K 306 may be uploaded into the engine system and/or stored in the engine system.Encryption system 300 may include ablock 302 for receiving and/or storing plaintext, ablock 380 for receiving and/or storing corresponding ciphertext, and anencryption block 304 that implements encryption function EK( ).Encryption block 304 may receive a block of plaintext (Pi or P′i) and generate a corresponding block of ciphertext based on cipher key K. - A block of plaintext Pi or obfuscated plaintext P′i may be input into
block 302. An initialkey mix operation 330 may be performed in which the plaintext block is XORed with an initialround key 310. In normal AES, this initial key is generated from a first portion of the cipher key K. This initial key mix operation provides the starting data for thefirst round 340. In some embodiments, instead of generating the first round key Ri l from the cipher key K (e.g., by expanding the initial key 310 Ri 0 that is based on the first portion of the cipher key K), a round key for one block may be used to generate a round key of another block. This will be described in more detail below. - During the
first round 340, the following operations occur: (a) a data block is transformed using S-box substitution 342, row shifting 344, and column mixing 346, (b) round key 312 is generated inkey expansion block 308, and (c) the transformed data block and round key 312 are added together using an XOR operation in theAddRoundKey 348 operation to provide the starting data block for the next round. Similar operations are repeated for each lth round 350 of AES (i.e., for each of the 14 rounds for AES256) with the exception that the column mixing operation is omitted in thefinal round 360. The details of the S-box substitution, row shifting, and column mixing operations for the rounds are described in the above-mentioned NIST document. - A sequence of round keys for each encryption round (or key schedule) is generated from the initial cipher key K using a key expansion routine, e.g., implemented by
block 308. In AES, the length of the round keys is the same as the block size (128 bits=4 words) regardless of the length (128, 192, or 256 bits) of the original cipher key. The words of the cipher key are used as is for generating the first round keys, then each successive round key word is a function of one or more of the preceding round key words. This generating of each successive round key word based on at least one of the preceding round key words will be referred to herein as the evolution of round keys. In AES256, encryption and decryption for a particular block evolve the round keys in reverse order. If the fourteen decryption round keys forblock 1 are R1 l through Rl 14, then the encryption round keys forblock 1 will be R1 14 through R1 1. - According to some embodiments, the cipher key used for encrypting subsequent blocks of plaintext or obfuscated plaintext is different with every block. This is different from normal AES where the same key schedule based on the same cipher key K is used for every block and the initial round key (i.e., round key 310) used in the first round of AES for every block is filled from the first words of the cipher key K. In some embodiments, encrypting a first block of plaintext P1 (or P′1) may use the same sequence of 14 round keys (or key schedule) as normal AES based on the original cipher key K. However, encrypting a second block of plaintext P2 (or P′2) may use a different key schedule. For example, a sequence of round keys for encrypting P2 may be based on expanding an initial round key that is different from the one used for P1.
- In some embodiments, every block may be encrypted using a different key such that the keys for encrypting subsequent blocks of plaintext are related. In some implementations, the round keys for encrypting different blocks of plaintext may continue to evolve between blocks. For example, the key used for encrypting a block of plaintext or obfuscated plaintext may be derived based on a function of the previous plaintext, the previous ciphertext, the previous key used to encrypt the previous plaintext or decrypt the previous ciphertext, and/or the previous LFSR value used to whiten the previous plaintext or unwhiten the previous ciphertext.
-
FIG. 3B is an exemplary block diagram representing the continuous evolution of cryptographic keys in a decryption system according to some embodiments. In the example illustrated inFIG. 3B , each row may correspond to one cryptographic round and each column may correspond to one block of ciphertext. In the particular example ofFIG. 3B , 14 decryption rounds and three blocks are illustrated. Each box depicts a decryption round key Rn l that may be used to decrypt block n during round l. The decryption keys of each column form a sequence of keys associated with one block of ciphertext. As explained above in connection withkey expansion block 308 ofFIG. 3A , a decryption round key Rn l+1 may be derived from a decryption round key of a previous round, e.g., Rn l. The relationship between the decryption round keys associated with one block may be expressed using a function fl( ) where l refers to the decryption round. This function fl( ) may describe the intra-block round key evolution used from decryption round key Rn1 to decryption round key Rn l+1. For AES128, the round key for block n and round l+1 can be derived as a function f( ) of the previous round key (i.e., Rn l+1=f(Rn l) because fl( ) is the same, regardless of round l). For AES256, the even and odd rounds have different functions because the even and odd round keys are a function of the upper and lower 128 bits of the cipher key K. Other types of block ciphers may have different functions for each round. - According to some embodiments of the present disclosure, the decryption round key for a block n may depend on the value of a decryption round key for a previous block n−1. For example, the first round decryption key for block n may be derived from the last round decryption key used for block n−1. An intra-block function fl( ) may be defined to extend the inter-block function fl( ) described above and describe the evolution of decryption round keys between blocks, i.e., such that Rn+1 l, =fl(Rn l). For example, and as shown by the arrow from the first to the second column labeled f14( ), the decryption round key R2 1 may be obtained from the decryption round key of the previous block, R1 14, by applying inter-block function f14( ) (i.e., R2 1=f14(R1 14)). This means that the key evolution of decryption round keys may continue between blocks. In standard AES256, f14( ) is not strictly defined (as the key is evolved, i.e., expanded, only 13 times to get 14 round keys, and the key of the first round key for the second block is regenerated from cipher key K, i.e., similarly to the first round key for the first block). In some embodiments that employ intra-block key evolution with an AES engine, f14( ) may be defined to be equal to the decryption key evolution function of the last even round, i.e., f12( ).
- The relationship between the decryption round keys illustrated in
FIG. 3B may also define the relationship between encryption round keys Rn 14, . . . , Rn 1 used for encryption.FIG. 3C is an exemplary block diagram representing the continuous evolution of cryptographic keys in an encryption system with 14 encryption rounds and three blocks. Letting f−1 l( ) correspond to the inverse of the decryption key evolution function fl( ) described above (both within and between blocks, i.e., inter and intra-block), the evolution of encryption round keys within each block n may be defined as Rn l=f−11 l(Rn l+1). The evolution of encryption round keys between blocks n+1 and n may be defined by Rn 14=f−1 l(Rn+1 l). This evolution of encryption round keys may be viewed as the inverse of the evolution of the decryption keys ofFIG. 3B . - In some embodiments, it may not be practical to evolve the encryption keys from the last block to the first block in order to starting encrypting the first block. For example, it may not be practical to start from R3 14 to compute R1 1 by sequentially applying f−1 l( ), per the order illustrated in
FIG. 3 . Instead of computing the encryption round keys backwards from the last block to the first block, the 14 encryption round keys Rn 14, . . . , Rn 1 may be obtained by first expanding the 14 decryption round keys Rn 1, . . . , Rn 14. In other words, each sequence of encryption round keys associated with block n (i.e., Rn 14, . . . , Rn 1) may be computed by generating the corresponding sequence of decryption round keys (i.e., Rn 1, . . . , Rn 14, as described inFIG. 3B above), and then inverting the order of the generated sequence of decryption round keys. - As discussed above, key schedule routines are specifically vulnerable to DPA attacks. According to one approach, an attacker may generate two large sets of ciphertext blocks and monitor the power consumption of a device while the device decrypts both sets of ciphertexts. Statistical analysis of the difference in power consumption between both sets may help derive information about the cipher key. The techniques described above of letting the round keys continue to evolve between block encryptions may increase the security of the device against these types of attacks because the keys used to decrypt the ciphertexts may vary with each block.
- In some embodiments, the intra-block key evolution approach described in
FIGS. 3A-3C above may be applied to cipher block modes of operation e.g. Counter Mode (CTR) or Cipher-Block-Chaining mode (CBC). In some embodiments, the evolving key approach may be combined with any other DPA resistant methods and systems such as the ones described herein. - In some embodiments, the security of the device against DPA may further be enhanced by obfuscating the substitution blocks used in a cryptographic algorithm, e.g., the S-box used in the S-
box substitution operation 342 ofFIG. 3A .FIG. 4 is an exemplary block diagram ofsystem 400 for obfuscating a cryptographic substitution box according to an embodiment of the present invention.System 400 includes S-box 206, which may be implemented in hardware or software on an encryption device, e.g., on a PLD or an encryption system in configuration device. An S-box is a typical component of symmetric key cryptographic algorithms that is used to obscure the relationship between the key and the data to be encrypted or decrypted. The S-box may be implemented as a table lookup that is indexed by a combination of key bits and plaintext. For example, each byte ofinput text 202 may be replaced with anotherbyte 208 according to the look up table and using the cipher key K. - S-boxes may be vulnerable to DPA attacks. An attacker may control the plaintext values and make guesses at the key bits. Based on these guesses, computations are performed on the monitored power consumption to form a set of DPA data. The DPA data is analyzed to determine with of the key bit guesses was likely correct. These types of attacks may be mitigated by obfuscating S-boxes used, for example, during AES.
- In some embodiments, S-
box 206 may be obfuscated by interleavinginput data 202 withrandom data 204. This random data may not be part of the plaintext or ciphertext. In some implementations,random data 204 may be true random, e.g., generated by a true random number generator (TRNG) implemented in an FPGA. In some implementations,random data 204 may be pseudo-random, e.g., generated with an LFSR similar toLFSR 204 fromFIG. 2 . In some implementations,random data 204 may be generated from a separate cryptographic method operating on an unrelated block of data. - In addition to or instead of the techniques described above for obfuscating plaintext, continuously evolving cryptographic round keys, and/or obfuscating substitution tables, security of a device may be enhanced by obfuscating ciphertext as illustrated in
FIGS. 5-8 below. -
FIG. 5A shows an exemplary block diagram ofencryption system 500 for encrypting data according to some embodiments.Encryption system 500 may include encryption blocks 506, 516, 526, and 536. These encryption blocks may be implemented asencryption block 300 ofFIG. 3A , using normal AES or AES modified to use continuously evolving keys.System 500 may also include combiningcircuitries circuitry 208 ofFIG. 2A . It should be noted that the number of encryption blocks and the number of combining circuitries are exemplary and not intended to limit the scope of the present invention. - Blocks of plaintext P1, P2, P3, and P4 are whitened using whitening bistream blocks L1, L2, L3, and L4. These whitening bistream blocks may be generated using an LFSR as described in
FIG. 2A above. The plaintext blocks and whitening bistream blocks are combined using combiningcircuitries - The blocks of obfuscated plaintext P′1, P′2, P′3, and P′4 are further obfuscated by combining them, respectively, with blocks of ciphertext C0, C1, C2, and C3 using combining
circuitries encryption blocks - Blocks H1, H2, H3, and H4 are encrypted using
encryption blocks FIGS. 3A-C above. In some embodiments, encryption blocks 506, 516, 526, and 536 may use the same cipher key, e.g., as defined in normal AES (K1=K2=K3=K4). - The first obfuscated block H1 is fed into the
first encryption block 506 to generate a block of ciphertext C1=EK1(H1), i.e., the result of encrypting H1 with cipher key K1. Combining circuitry 508 combines the output of thefirst encryption block 506 with a block of mask values H0=E−1 K0(0) to generate a first block of obfuscated ciphertext C′1. This block of mask values may be generated by decrypting a vector of all zeros using cipher key K0. This first block of obfuscated ciphertext C′1 may thus be expressed as C1 XOR H0. - The block of ciphertext C1 is combined with the second block of obfuscated plaintext P′2 using combining
circuitry 514. The output of combiningcircuitry 514, H2, is fed into thesecond encryption block 516.Second encryption block 516 encrypts H2 to generate a second block of ciphertext C2=EK2(H2). Combiningcircuitry 518 combines the first block of further obfuscated plaintext H1 with the second block of ciphertext C2 to generate a second block of obfuscated ciphertext C′2. The operation of combiningcircuitry 518 may be viewed as whitening the block of ciphertext C2 with the prior block of further obfuscated plaintext H1 to output the block of obfuscated ciphertext C′2. - Similar operations may be repeated to generate a third block and fourth block of ciphertext C3 and C4 and a third block and fourth block of obfuscated ciphertext C′3 and C′4.
- In general, the blocks of obfuscated plaintext, further obfuscated plaintext, ciphertext, and obfuscated ciphertext that are output by
encryption system 500 may be expressed using the following equations: -
L 0=0, (EQ. 1a) -
R 0 =E −1 K0(0), (EQ. 1b) -
L i=(R i−1∥0)DIV POLY, (EQ. 1c) -
R i=(R i−1 ∥P 1)MOD POLY, (EQ. 1d) -
H 0 =E −1 K0(0), (EQ. 2a) -
C 0=0, (EQ. 2b) -
P 1 =IV, (EQ. 2c) -
P′ i =L iXORP i, (EQ. 3a) -
H i =P′ iXORC i−1, (EQ. 3b) -
C i =E Ki(H i), (EQ. 3c) -
C′ i =C iXORH i−1, (EQ. 3d) - where i=1, . . . , N. The first set of equations, EQS. 1a, 1b, 1c, and 1d, is the same as the incremental LFSR equations of
FIG. 2A and corresponds to the generation of bitstream blocks L1, L2, L3, and L4. The second set of equations, EQS. 2a, 2b, and 2c, corresponds to initialization values for the inputs of combiningcircuitries - The blocks of obfuscated ciphertext output by
encryption system 500 may be decrypted usingdecryption system 550 illustrated inFIG. 5B .Decryption system 550 may include decryption blocks 554, 564, 574, and 584, and combiningcircuitries circuitry 208 ofFIG. 2A . It should be noted that the number of decryption blocks and the number of combining circuitries are exemplary and not intended to limit the scope of the present invention. - Blocks of obfuscated ciphertext C′1, C′2, C′3, and C′4 are fed into
decryption system 550. These blocks of obfuscated ciphertext may for example have been output fromencryption system 500 ofFIG. 5A . Combiningcircuitry 552 may combine a first block of obfuscated ciphertext C′1 with a block of mask values H0=E−1 K0(0). In some implementations, the block of mask values may be generated similarly toFIG. 5A , i.e., by decrypting a vector of all zeros using cipher key K0. Combining circuitry 552 may output a ciphertext block C1=C′1 XOR H0, which is fed into thefirst decryption block 554.First decryption block 554 decrypts ciphertext block C1 with cipher key K1 to produce a first block of further obfuscated plaintext H1. - The first block of further obfuscated plaintext H1 may be combined with a block of ciphertext C0 using combining
circuitry 556. The output of the combiningcircuitry 556 corresponds to obfuscated plaintext block P′1. This block of obfuscated plaintext P′1 may be unwhitened with bistream block L1 to generate a block of plaintext P1. The bistream block L1 may be generated by an LFSR such as the one depicted inFIG. 2B . - The block of further obfuscated plaintext H1 is combined with obfuscated ciphertext block C′2 using combining
circuitry 562 to generate a block of ciphertext C2. This block of ciphertext C2 is decrypted usingdecryption block 564 to generate H2. Block H2 is combined with ciphertext block C1 to generate obfuscated plaintext block P′2. This block of obfuscated plaintext P′2 may be unwhitened similarly to P′1 in order to generate plaintext block P2. - Similar operations may be repeated to generate a third and fourth block of obfuscated plaintext P′3 and P′4, and a third and fourth block of plaintext P3 and P4. The operation of
decryption system 550 may be summarized using the following equations: -
R 0 =E −1 K0(0), (EQ. 4a) -
L i=(R i−1∥0)DIV POLY, (EQ. 4b) -
R i=(R i−1 ∥P i)MOD POLY, (EQ. 4c) -
H 0 =E −1 K0(0), (EQ. 5a) -
C 0=0, (EQ. 5b) -
C i =C′ iXORH i−1, (EQ. 6a) -
H i =E −1 Ki(C i), (EQ. 6b) -
P′ i =H iXORC i−1, (EQ. 6c) -
P i =L iXORP′ i, (EQ. 6d) - where i=1, . . . , N. The first set of equations, EQS. 4a, 4b, and 4c, is the same as the incremental LFSR equations of
FIG. 2B and corresponds to the generation of bitstream blocks L1, L2, L3, and L4. The second set of equations, EQS. 5a and 5b, corresponds to initialization values for the inputs of combiningcircuitries - Although the encryption and decryption blocks and operations illustrated in
FIGS. 5A and 5B above use cipher keys with different indices K1, K2, K3, and K4, it should be understood that these cipher keys may be the same or different. In some implementations, these keys may be set to one value K, e.g., for normal AES (K1=K2=K3=K4). In some implementations, these keys may be different and may be generated using the evolving key approach described inFIGS. 3A-C above. - An illustrative implementation of the decryption system of
FIG. 5B is shown inFIG. 6 .Decryption system 600 ofFIG. 6 may include M-bit shift registers decryption engine 614,registers circuitries LFSR 640 may be implemented similarly toLFSR 204 ofFIG. 2B . Combiningcircuitries circuitry 208 ofFIG. 2A . -
Input shift register 604 may receive blocks of obfuscated ciphertext C′i (i=1, . . . , N). These blocks may be output, for example, fromencryption system 500 ofFIG. 5A . In some embodiments, the blocks of obfuscated ciphertext may be received sequentially byshift register 604, such that, asinput shift register 604 is receiving C′i+2,input shift register 604 is outputting C′i+1, register 608 is outputting C′i, and register 609 is outputting C′i−1. This arrangement is merely illustrative, and any number ofregisters input shift register 604 may be used as appropriate. - Combining
circuitry 610 may receive a first block of obfuscated ciphertext C′i+1 fromshift register 604 and combine it with an output ofdecryption engine 614 to generate a corresponding block of ciphertext Ci+1. The output of combiningcircuitry 610 is coupled to thedecryption engine 614.Decryption engine 614 may decrypt the first block of ciphertext Ci+1 to output a first block of further obfuscated plaintext Hi, e.g., as specified in EQ. 6a above. The block of further obfuscated plaintext Hi may be fed back to combiningcircuitry 610 to generate the corresponding block of ciphertext Ci+1, e.g., as specified in EQ. 6b above. - The output of combining
circuitry 610 may also be coupled to serially connectedregisters circuitry 616 may combine the block of ciphertext output by register 609 (e.g., Ci−1) with the block of further obfuscated plaintext Hi to output a block of obfuscated plaintext P′i, as specified in EQ. 6c above. - The block of obfuscated plaintext P′i (i=1, . . . , N) may be input into
shift register 618, which is coupled to combingcircuitry 644 andLFSR 640. Combiningcircuitry 644 andLFSR 640 are arranged similarly tosystem 250 ofFIG. 2B above, and are configurable to unwhiten the block of obfuscated plaintext P′i to generate a block of plaintext Pi, e.g., as described in EQ. 6d above. - In some embodiments, the
feedback line 620 from the output ofdecryption engine 614 to the input of combiningcircuitry 610 may be selectively disabled. By disabling this feedback line,decryption engine 614 may implement decryption algorithm using normal CBC mode (i.e., without whitening obfuscated ciphertext blocks with prior plaintext blocks Hi.) - The techniques of obfuscating plaintext and ciphertext described above may help make a device more secure against DPA. First, by masking both the input and output of the AES engine, DPA attacks may be prevented on the first and last round of a single block decryption, which are typically the most vulnerable rounds. Second, the attacker may be prevented from injecting multiple known ciphertext blocks with varying different bits, because all subsequent ciphertext blocks would be cryptographically corrupted. For example, an attacker may toggle bits of only one ciphertext block, C′1, in a known fashion, and analyze the power profiles of the device while the device decrypts a large number of ciphertexts differing in this one ciphertext block C′i. Using the techniques for whitening or obfuscating ciphertext blocks described above, changing one ciphertext block would propagate across all following ciphertext blocks, which would make this type of attack substantially more difficult.
- In some embodiments,
decryption engine 614 may decrypt each block Ci using the same cipher key K. In some embodiments,decryption engine 614 may implement continuously evolving key as described inFIGS. 3A-C above. For example,decryption engine 614 may expand cipher key K from one block to the next. For instance, the first round key in decrypting ciphertext block C2 may be initialized to the value of the final round key used in decrypting ciphertext block C1. - In some embodiments,
AES decryption engine 614 may implement the S-box obfuscation described inFIG. 4 above. In some implementations,decryption engine 614 may implement the AES algorithm using 4 S-boxes that are obfuscated as described inFIG. 4 above, e.g., using true random or pseudo-random data. -
FIGS. 7A, 7B, and 8 are variants of the encryption and decryption systems illustrated inFIGS. 5A, 5B, and 6 , respectively. -
FIG. 7A is an exemplary block diagram of anencryption system 700 for encrypting data according to some embodiments.System 700 may operate similar tosystem 500 ofFIG. 5A , except that ciphertext blocks Ci are obfuscated with blocks of obfuscated plaintext P′i−1, instead of with blocks of further obfuscated plaintext Hi−1 as is the case insystem 500. For example, combiningcircuitry 718 is coupled to an output of combiningcircuitry 702 throughline 710. In contrast, inFIG. 5A , combiningcircuitry 518 is coupled to an output of combiningcircuitry 504 throughline 510. - The operation of
system 700 may be described using equations similar tosystem 500, with EQS. 2a and 3 d modified as follows: -
P′ 0 =E −1 K0(0), (EQ. 2a′) -
C′ 1 =C iXOR P′ i−1. (EQ. 3d′) - The value P′0 of EQ. 2a′ corresponds to the initialization value for the input of combining
circuitry 708. It should be noted that this initialization value is merely illustrative, and that any suitable value may be used to initialize P′0. The obfuscation of ciphertext blocks using previous obfuscated plaintext blocks is shown in EQ. 3d′. -
FIG. 7B is an exemplary block diagram of adecryption system 750 for decrypting data according to some embodiments.System 750 may operate similar tosystem 550 ofFIG. 5B , except that obfuscated ciphertext blocks C′i are unwhitened with blocks of obfuscated plaintext P′i−1, instead of with blocks of further obfuscated plaintext Hi−1 as is the case insystem 550. For example, combiningcircuitry 762 is coupled to an output of combiningcircuitry 756 throughline 760. In contrast, inFIG. 5B , combiningcircuitry 562 is coupled to an output ofdecryption block 554 throughline 560. - The operation of
system 750 may be described using equations similar tosystem 550, with EQS. 5a and 6 a modified as follows: -
P′ 0 =E −1 K0(0), (EQ. 5a′) -
C i =C′ iXORP′ i−1, (EQ. 6a′) - The value P′0 of EQ. 5a′ corresponds to the 2a′ corresponds to the initialization value for the input of combining
circuitry 756. It should be noted that this initialization value is merely illustrative, and that any suitable value may be used to initialize P′0. The unwhitening of obfuscated ciphertext blocks using previous obfuscated plaintext blocks is shown in EQ. 6a′. - An illustrative implementation of the decryption system of
FIG. 7B is shown inFIG. 8 .System 800 ofFIG. 8 may operate similar tosystem 600 ofFIG. 6 , except thatfeedback line 820 connects an output of combining circuitry 818 to combining circuitry 810. In contrast, inFIG. 6 ,feedback line 620 connects the output of the decryption engine to combiningcircuitry 610. This modification reflects EQ. 6a′ above, such that blocks of obfuscated ciphertext are unwhitened using previous blocks of obfuscated plaintext P′i, rather than previous blocks of further obfuscated plaintext Hi. -
FIG. 9 shows an exemplary flowchart ofprocess 900 for encrypting data in accordance with some embodiments.Process 900 may be executed, for example, in a system for encrypting configuration data that may be external or internal to a programmable device. - At 902, plaintext is received, for example, configuration data for configuring
PLD 100 ofFIG. 1 is received at the encryption system. - At 904, it is determined whether plaintext obfuscation is enabled. For example, a bit register in the configuration device may be set to enable or disable this feature. In some embodiments, plaintext obfuscation may always be enabled. If plaintext obfuscation is enabled, then plaintext is whitened at
step 906, for example, as described inFIG. 2A above. Step 908 may then be performed. Alternatively, if plaintext obfuscation is disabled, then 908 may be immediately performed. - At 908, it is determined whether continuous key evolution is enabled. For example, a bit register in the configuration device may be set to enable or disable allowing the key to continue to evolve in between blocks. This may be useful for users who want to implement AES strictly according to the NIST standard, i.e., by generating round keys for each block encryption starting from the cipher key. If continuous key evolution is not enabled, then 912 may be performed. Alternatively, if at 908 key evolution mode is enabled, then 910 may be performed.
- At 910, plaintext (or obfuscated plaintext from 906 if plaintext whitening is enabled) is encrypted with such that different blocks are encrypted with different keys, as described in connection with
FIGS. 3A-C above. Otherwise, at 912, plaintext (or obfuscated plaintext from 906 if plaintext whitening is enabled) is encrypted using normal AES, i.e., using the original cipher key for generating the sequence of round keys (key schedule). - At 914, it is determined whether S-box obfuscation is enabled. For example, a bit register in the configuration device may be set to enable or disable this feature. Given that obfuscating cryptographic S-boxes may add computational overhead, a user may wish to disable this feature in some implementations.
- If S-box obfuscation is enabled, plaintext is encrypted at 916 using obfuscated S-boxes as described in connection with
FIG. 4 above, where plaintext is input into the obfuscated S-box. If S-box obfuscation is disabled, plaintext is encrypted at 918 using non-obfuscated S-boxes, such as the normal AES S-boxes. - At 920, it is determined whether ciphertext obfuscation is enabled. If it is, 922 may be performed. Otherwise, 924 may be performed.
- At 922, encryption is carried out by whitening output blocks of ciphertext with blocks of plaintext (that may have been whitened or not at 906). This may be implemented using
encryption system 500 ofFIG. 5A orencryption 700 ofFIG. 7A . - Alternatively, if ciphertext obfuscation is not enabled, then the normal cryptographic method (e.g., AES encryption) may be implemented using normal CBC mode.
- Finally, at 930, ciphertext corresponding to the plaintext received at 902 is output.
-
FIG. 10 shows an exemplary flowchart ofprocess 1000 for decrypting data in accordance with some embodiments.Process 1000 may be executed, for example, in a system for decrypting configuration data in a programmable device, e.g.,decoder 102 ofprogrammable logic device 100 ofFIG. 1 . - At
step 1002, ciphertext is received, for example, encrypted configuration data for configuringPLD 100 ofFIG. 1 is received at the decryption system, or ciphertext output byencryption process 900 ofFIG. 9 . - At 1004, it is determined whether ciphertext obfuscation is enabled. For example,
feedback lines 620 ofFIG. 6 or 820 ofFIG. 8 may be enabled in this case. If ciphertext obfuscation is enabled, 1006 may be performed. Otherwise, 1008 may be performed. - At 1006, decryption is carried out by whitening ciphertext with blocks of plaintext. This may be implemented using
decryption systems 550 ofFIG. 5B, 600 ofFIG. 6, 750 ofFIG. 7B , or 800 ofFIG. 8 . Alternatively, at 1008, if ciphertext obfuscation is not enabled, then the normal cryptographic method (e.g., AES decryption) may be implemented using normal CBC mode. For example,feedback lines 620 ofFIG. 6 or 820 ofFIG. 8 may be disabled in this case. - At 1010, it is determined whether S-box obfuscation is enabled. If S-box obfuscation is enabled, ciphertext is decrypted at 1012 using obfuscated S-boxes as described in connection with
FIG. 4 above, where ciphertext is input into the obfuscated S-box. Otherwise, if S-box obfuscation is disabled, ciphertext is decrypted using non-obfuscated S-boxes at 1014, such as the normal AES S-boxes. - At 1016, it is determined whether continuous key evolution is enabled. If continuous key evolution is disabled, then ciphertext may be decrypted using normal AES decryption at 1020. Alternatively, if the key evolution mode is enabled, then 1018 may be performed.
- At 1018, ciphertext is decrypted with a continuously evolving key, as described in connection with
FIGS. 3A-B . In some implementations, different cipher keys may be used to decrypt different blocks. In some implementations, while running the AES decryption based on cipher key K, decryption of a subsequent block may use round keys that have been expanded from the key schedule of a previous block decryption. - At 1022, it is determined whether plaintext obfuscation is enabled. If plaintext obfuscation is enabled, then whitened plaintext is whitened at
step 1024, for example, as described inFIG. 2B above. In particular, whitening blocks of whitenedplaintext using LFSR 254 and combiningcircuitry 258 ofFIG. 2B may generate corresponding blocks of plaintext. - Finally, at 1026, plaintext (e.g., corresponding to configuration data) that corresponds to ciphertext received at 1002 is output.
- It will be understood that the above steps of
processes process - It will be understood that the foregoing is only illustrative of the principles of the invention, and that various modifications can be made by those skilled in the art without departing from the scope and spirit of the invention. For example, the various elements of this invention can be provided on a PLD in any desired number and/or arrangement. One skilled in the art will appreciate that the present invention can be practiced by other than the described embodiments, which are presented for purposes of illustration and not of limitation, and the present invention is limited only by the claims that follow.
Claims (21)
1-20. (canceled)
21. A system, comprising:
an electronic device to generate an encrypted bitstream to configure a field programmable gate array (FPGA), wherein the electronic device is operable to:
encrypt a first block of an unencrypted bitstream based on a first key to generate a first encrypted block of the encrypted bitstream;
encrypt a second block of the unencrypted bitstream based on a second key to generate a second encrypted block of the encrypted bitstream; and
encrypt a third block of the unencrypted bitstream based on a third key to generate a third encrypted block of the encrypted bitstream; and
the FPGA, wherein the FPGA is operable to receive the encrypted bitstream and use an internal decryption engine to:
decrypt the first encrypted block based on the first key;
obtain the second key based on the decryption of the first encrypted block;
decrypt the second encrypted block based on the second key;
obtain the third key based on the decryption of the second encrypted block; and
decrypt the third encrypted block based on the third key.
22. The system of claim 21 , wherein the encrypted bitstream is stored in an off-chip memory prior to sending the encrypted bitstream to the FPGA.
23. The system of claim 21 , wherein the FPGA stores the first key in an on-chip memory of the FPGA.
24. The system of claim 21 , wherein the internal decryption engine decrypts using an Advanced Encryption Standard (AES) algorithm.
25. The system of claim 21 , wherein the first key, the second key, and the third key are different from one another.
26. The system of claim 21 , wherein the encrypted bitstream results in a disabled readback of configuration.
27. The system of claim 21 , wherein the first key comprises a user-supplied key.
28. The system of claim 21 , wherein the first key is obfuscated.
29. The system of claim 21 , wherein the decrypted first block, the decrypted second block, the decrypted third block, or a combination thereof, are stored as configuration data in configuration memory of the FPGA.
30. The system of claim 29 , wherein the configuration data is used to configure the FPGA.
31. The system of claim 21 , wherein the first key is a symmetric key enabling access to the encrypted bitstream.
32. A field programmable gate array (FPGA) configured to receive a plurality of blocks of an encrypted bitstream, the FPGA comprising:
a plurality of configurable logic blocks;
a decryption engine configured to:
decrypt a first block of the plurality of blocks, wherein decrypting the first block is based on a first key; and
decrypt successive blocks of the plurality of blocks using successive keys, wherein the successive keys are determined based on a previously decrypted block of the plurality of blocks; and
configuration memory configured to store at least part of the decrypted first block, the decrypted successive blocks, or some combination thereof, as configuration data, wherein the configuration data configures the plurality of configurable logic blocks of the FPGA.
33. The FPGA of claim 32 , wherein the plurality of blocks are stored in an external memory device separate from the FPGA before decryption by the decryption engine.
34. The FPGA of claim 32 , wherein the first key is stored on an on-chip memory of the FPGA.
35. The FPGA of claim 32 , wherein the decrypting comprises using an Advanced Encryption Standard (AES) algorithm.
36. The FPGA of claim 32 , wherein the successive keys are unique keys.
37. A method for configuring a field programmable gate array (FPGA) with an encrypted bitstream, comprising:
partitioning an unencrypted bitstream into a plurality of blocks;
encrypting a first block of the plurality of blocks based on a first key;
encrypting successive blocks of the plurality of blocks based on successive keys;
transmitting the encrypted plurality of blocks to a decryption engine to decrypt the encrypted plurality of blocks;
direct a decryption of the first block based on the first key; and
direct a decryption of the successive blocks based on the successive keys, wherein the successive keys are determined based on a decryption of a previously encrypted block of the successive blocks.
38. The method of claim 37 , wherein the first key is stored in an on-chip memory of the FPGA.
39. The method of claim 37 , wherein the decrypted first block, the decrypted successive blocks, or a combination thereof, are stored as configuration data in configuration memory of the FPGA.
40. The method of claim 39 , wherein the configuration data is used to configure the FPGA.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/387,286 US20200244434A1 (en) | 2011-04-29 | 2019-04-17 | Differential power analysis resistant encryption and decryption functions |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/098,315 US9331848B1 (en) | 2011-04-29 | 2011-04-29 | Differential power analysis resistant encryption and decryption functions |
US15/139,071 US10320554B1 (en) | 2011-04-29 | 2016-04-26 | Differential power analysis resistant encryption and decryption functions |
US16/387,286 US20200244434A1 (en) | 2011-04-29 | 2019-04-17 | Differential power analysis resistant encryption and decryption functions |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/139,071 Continuation US10320554B1 (en) | 2011-04-29 | 2016-04-26 | Differential power analysis resistant encryption and decryption functions |
Publications (1)
Publication Number | Publication Date |
---|---|
US20200244434A1 true US20200244434A1 (en) | 2020-07-30 |
Family
ID=55807646
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/098,315 Active 2034-04-25 US9331848B1 (en) | 2011-04-29 | 2011-04-29 | Differential power analysis resistant encryption and decryption functions |
US15/139,071 Active 2031-10-19 US10320554B1 (en) | 2011-04-29 | 2016-04-26 | Differential power analysis resistant encryption and decryption functions |
US16/387,286 Abandoned US20200244434A1 (en) | 2011-04-29 | 2019-04-17 | Differential power analysis resistant encryption and decryption functions |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/098,315 Active 2034-04-25 US9331848B1 (en) | 2011-04-29 | 2011-04-29 | Differential power analysis resistant encryption and decryption functions |
US15/139,071 Active 2031-10-19 US10320554B1 (en) | 2011-04-29 | 2016-04-26 | Differential power analysis resistant encryption and decryption functions |
Country Status (1)
Country | Link |
---|---|
US (3) | US9331848B1 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023170439A1 (en) * | 2022-03-10 | 2023-09-14 | Sorbonne Universite | Method for securing telecommunication transceiver integrated circuit designs against piracy, counterfeiting and unauthorized use |
US12126709B2 (en) | 2021-08-08 | 2024-10-22 | Nuvoton Technology Corporation | Power analysis attack protection |
US12206760B1 (en) | 2023-08-30 | 2025-01-21 | Pqsecure Technologies, Llc | Hardware architecture configured to implement ASCON cryptographic algorithms and protect against side-channel attacks |
EP4498630A1 (en) * | 2023-07-25 | 2025-01-29 | Nagravision Sàrl | Methods, unit and device for concurrently executing first and second block cryptographic computations |
EP4498631A1 (en) * | 2023-07-25 | 2025-01-29 | Nagravision Sàrl | Methods, unit and device for successively executing first and next block cryptographic computations |
US20250047470A1 (en) * | 2023-08-03 | 2025-02-06 | Dell Products, Lp | Method and apparatus for high performance data signing and encryption with stream whitening with an advanced encryption standard-electronic codebook (aes-ecb) block |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8958550B2 (en) * | 2011-09-13 | 2015-02-17 | Combined Conditional Access Development & Support. LLC (CCAD) | Encryption operation with real data rounds, dummy data rounds, and delay periods |
TWI712915B (en) * | 2014-06-12 | 2020-12-11 | 美商密碼研究公司 | Methods of executing a cryptographic operation, and computer-readable non-transitory storage medium |
US10110373B2 (en) * | 2015-02-13 | 2018-10-23 | Global Integrity, Inc. | System and method for manipulating both the plaintext and ciphertext of an encryption process prior to dissemination to an intended recipient |
ES2957712T3 (en) * | 2016-04-07 | 2024-01-24 | Nagravision Sarl | Flexible cryptographic device |
CN107547193A (en) * | 2016-06-28 | 2018-01-05 | 埃沙尔公司 | Make replacement operation from the method for side Multiple Channel Analysis |
US10256973B2 (en) * | 2016-09-30 | 2019-04-09 | Intel Corporation | Linear masking circuits for side-channel immunization of advanced encryption standard hardware |
FR3061384B1 (en) * | 2016-12-22 | 2019-05-24 | Idemia France | DATA PROCESSING METHOD |
US10484169B1 (en) * | 2017-06-02 | 2019-11-19 | Google Llc | Cipher block chaining data obfuscation |
TW201919361A (en) * | 2017-11-09 | 2019-05-16 | 張英輝 | Method for block cipher enhanced by nonce text protection and decryption thereof |
CN108566270B (en) * | 2018-04-26 | 2021-10-01 | 成都盛拓源科技有限公司 | Novel encryption method using double block cipher |
US10263767B1 (en) * | 2018-07-03 | 2019-04-16 | Rajant Corporation | System and method for power analysis resistant clock |
TWI675578B (en) * | 2018-12-06 | 2019-10-21 | 新唐科技股份有限公司 | Encryption and decryption system, encryption device, decryption device and encryption and decryption method |
WO2021048341A1 (en) * | 2019-09-13 | 2021-03-18 | Dencrypt A/S | Methods and devices for secure data communication |
US11632231B2 (en) * | 2020-03-05 | 2023-04-18 | Novatek Microelectronics Corp. | Substitute box, substitute method and apparatus thereof |
CN112883395A (en) * | 2021-02-25 | 2021-06-01 | 山东华翼微电子技术股份有限公司 | High-performance GFN mask method for enhancing anti-attack capability |
Family Cites Families (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6249582B1 (en) * | 1997-12-31 | 2001-06-19 | Transcrypt International, Inc. | Apparatus for and method of overhead reduction in a block cipher |
US20030002677A1 (en) * | 2001-06-28 | 2003-01-02 | Amit Dagan | Software implementations of input independent LFSR-based algorithms |
CA2486713A1 (en) * | 2002-05-23 | 2003-12-04 | Atmel Corporation | Advanced encryption standard (aes) hardware cryptographic engine |
GB0214620D0 (en) * | 2002-06-25 | 2002-08-07 | Koninkl Philips Electronics Nv | Round key generation for AES rijndael block cipher |
US7415109B2 (en) * | 2002-08-23 | 2008-08-19 | Qualcomm Incorporated | Partial encryption and full authentication of message blocks |
US20040131182A1 (en) * | 2002-09-03 | 2004-07-08 | The Regents Of The University Of California | Block cipher mode of operation for constructing a wide-blocksize block cipher from a conventional block cipher |
US7502470B2 (en) * | 2003-01-13 | 2009-03-10 | Silicon Image, Inc. | Method and apparatus for content protection within an open architecture system |
US7451310B2 (en) * | 2002-12-02 | 2008-11-11 | International Business Machines Corporation | Parallelizable authentication tree for random access storage |
US7321659B2 (en) * | 2003-10-01 | 2008-01-22 | International Business Machines Corporation | Simple universal hash for plaintext aware encryption |
US8332652B2 (en) * | 2003-10-01 | 2012-12-11 | International Business Machines Corporation | Computing device that securely runs authorized software |
US7697681B2 (en) * | 2004-02-06 | 2010-04-13 | Nortel Networks Limited | Parallelizable integrity-aware encryption technique |
WO2005107138A1 (en) * | 2004-03-29 | 2005-11-10 | Stmicroelectronics Sa | Processor for executing an aes-type algorithm |
US20060023875A1 (en) * | 2004-07-30 | 2006-02-02 | Graunke Gary L | Enhanced stream cipher combining function |
US7715555B2 (en) * | 2004-09-07 | 2010-05-11 | Broadcom Corporation | Method and system for extending advanced encryption standard (AES) operations for enhanced security |
CN101147354B (en) * | 2005-03-01 | 2010-10-27 | Nxp股份有限公司 | Generator for generating a message authentication code, method of generating a message authentication code, program element and computer-readable medium |
WO2007121035A2 (en) * | 2006-03-23 | 2007-10-25 | Exegy Incorporated | Method and system for high throughput blockwise independent encryption/decryption |
US8127130B2 (en) * | 2006-04-18 | 2012-02-28 | Advanced Communication Concepts, Inc. | Method and system for securing data utilizing reconfigurable logic |
US20080130891A1 (en) * | 2006-11-03 | 2008-06-05 | Alvin Sun | Integrated circuit device interface with parallel scrambler and descrambler |
US8880574B2 (en) * | 2008-09-24 | 2014-11-04 | Advantest (Singapore) Pte Ltd | State machine and generator for generating a description of a state machine feedback function |
US9336160B2 (en) * | 2008-10-30 | 2016-05-10 | Qualcomm Incorporated | Low latency block cipher |
US9600421B2 (en) * | 2009-05-20 | 2017-03-21 | Conexant Systems, Inc. | Systems and methods for low-latency encrypted storage |
DE102009050493A1 (en) * | 2009-10-23 | 2011-04-28 | Röllgen, Bernd | Block data encryption methods |
US8619985B2 (en) * | 2010-04-27 | 2013-12-31 | Research In Motion Limited | Table splitting for cryptographic processes |
US9391770B2 (en) * | 2012-06-12 | 2016-07-12 | Tigerspike Products, Pte. Ltd | Method of cryption |
-
2011
- 2011-04-29 US US13/098,315 patent/US9331848B1/en active Active
-
2016
- 2016-04-26 US US15/139,071 patent/US10320554B1/en active Active
-
2019
- 2019-04-17 US US16/387,286 patent/US20200244434A1/en not_active Abandoned
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12126709B2 (en) | 2021-08-08 | 2024-10-22 | Nuvoton Technology Corporation | Power analysis attack protection |
WO2023170439A1 (en) * | 2022-03-10 | 2023-09-14 | Sorbonne Universite | Method for securing telecommunication transceiver integrated circuit designs against piracy, counterfeiting and unauthorized use |
EP4498630A1 (en) * | 2023-07-25 | 2025-01-29 | Nagravision Sàrl | Methods, unit and device for concurrently executing first and second block cryptographic computations |
EP4498631A1 (en) * | 2023-07-25 | 2025-01-29 | Nagravision Sàrl | Methods, unit and device for successively executing first and next block cryptographic computations |
US20250047470A1 (en) * | 2023-08-03 | 2025-02-06 | Dell Products, Lp | Method and apparatus for high performance data signing and encryption with stream whitening with an advanced encryption standard-electronic codebook (aes-ecb) block |
US12206760B1 (en) | 2023-08-30 | 2025-01-21 | Pqsecure Technologies, Llc | Hardware architecture configured to implement ASCON cryptographic algorithms and protect against side-channel attacks |
WO2025048795A1 (en) * | 2023-08-30 | 2025-03-06 | Pqsecure Technologies Llc | A hardware architecture configured to implement ascon cryptographic algorithms and protect against side-channel attacks |
Also Published As
Publication number | Publication date |
---|---|
US10320554B1 (en) | 2019-06-11 |
US9331848B1 (en) | 2016-05-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20200244434A1 (en) | Differential power analysis resistant encryption and decryption functions | |
Borkar et al. | FPGA implementation of AES algorithm | |
US8127130B2 (en) | Method and system for securing data utilizing reconfigurable logic | |
US11546135B2 (en) | Key sequence generation for cryptographic operations | |
US8416947B2 (en) | Block cipher using multiplication over a finite field of even characteristic | |
Karthigaikumar et al. | Simulation of image encryption using AES algorithm | |
Mourouzis | Optimizations in algebraic and differential cryptanalysis | |
Singh et al. | Study & analysis of cryptography algorithms: RSA, AES, DES, T-DES, blowfish | |
Priya et al. | FPGA implementation of efficient AES encryption | |
Subaselvi et al. | VLSI Implementation of Triple-DES Block Cipher | |
Venkatesha et al. | AES based algorithm for image encryption and decryption | |
Landge et al. | VHDL based Blowfish implementation for secured embedded system design | |
Ledda et al. | Enhancing IDEA algorithm using circular shift and middle square method | |
US20240097880A1 (en) | High-speed circuit combining aes and sm4 encryption and decryption | |
Bajaj et al. | AES algorithm for encryption | |
Naidu et al. | Design of high throughput and area efficient advanced encryption system core | |
Reddy et al. | A new symmetric probabilistic encryption scheme based on random numbers | |
Kumar et al. | Implementation of AES algorithm using Verilog | |
Pancholi et al. | Cryptography: comparative studies of different symmetric algorithms | |
Swamy et al. | Performance Analysis of Secure Integrated Circuits using Blowfish Algorithm | |
Prasanthi et al. | Enhanced AES algorithm | |
Rabas | Cryptanalytic attacks on lightweight ciphers | |
Gujar | Image encryption using AES algorithm based on FPGA | |
Banu | FPGA Based Hardware Implementation of Encryption Algorithm | |
Reddy et al. | Implementation of multi mode AES algorithm using Verilog |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |