The invention discloses a method for defensing zero
power consumption attack on a code device. The method is characterized in that
inverse operation on a GF (28) finite field in a
byte replacing module is replaced with GF (28) field additivity shielding
inverse operation. The specific process is that
inverse operation is first conducted on the GF (28) finite field, then the GF (28) field additivity shielding inverse operation is conducted, and a simpler GF (256) field additivity shielding inverse
algorithm is provided by adopting a key module
multiplexing method on the base that the traditional improved
advanced encryption standard is analyzed. The method has the advantages of maintaining good zero
power consumption attack resistance, being reasonable in area expense and circuit speed and capable of being widely applied to coprocessors and fields with high requirements for area, speed and security.