期刊文献+

抵御侧信道分析的AES双路径掩码方法 被引量:3

AES Dual-path Masking Method for Resisting Side-channel Analysis
下载PDF
导出
摘要 为抵御功耗、电磁辐射等侧信道分析攻击,提出一种高级加密标准(AES)双路径掩码方法。采用2条数据路径,将随机数和随机S盒用于掩码操作,使一个加、解密轮次内的所有中间运算结果与AES算法的标准中间结果都不相同,且各中间结果的汉明重量随明文随机变化。实验结果表明,AES算法中间结果的汉明重量与该方法产生的能量特征之间的相关性被完全消除,可抵御各种侧信道分析攻击。 In order to resist the side-channel analysis as power and EM attack, a dual-path masking method is proposed for Advanced Encryption Standard(AES) algorithm implementation. Through two data paths, the random numbers and random S-boxes are used to mask operation, which makes all intermediate variables among the proposed AES scheme different from that of the standard method, and the Hamming distance corresponding to each intermediate variable changes with the plaintext. It is simple in structure, and conducive to software and hardware implementation. Experimental result shows the correlation between the intermediates of standard AES and the energy characteristics of proposed AES scheme are completely removed. Thus, the proposed method bears strong immunity to all known side-channel analysis.
出处 《计算机工程》 CAS CSCD 2012年第13期108-111,共4页 Computer Engineering
基金 国家发展和改革委员会信息安全专项基金资助项目([2010]3044号)
关键词 侧信道分析 高级加密标准算法 差分功耗分析 掩码方法 S盒 时序折叠 side-channel analysis Advanced Encryption Standard(AES) algorithm Differential Power Analysis(DPA) masking method S-box timing folding
  • 相关文献

参考文献8

  • 1Kocher P,Jaffe J,Jun Benjamin.Differential PowerAnalysis[C]//Proc.of CRYPTO’99.[S.l.]:Springer-Verlag,1999:388-397.
  • 2Mangard S,Pramstaller N,Oswald E.Successfully AttackingMasked AES Hardware Implementations[C]//Proc.of Workshopon Cryptographic Hardware and Embedded Systems.[S.l.]:Springer-Verlag,2005:157-171.
  • 3Joye M,Paillier P,Schoenmakers B.On Second-order DifferentialPower Analysis[C]//Proc.of Workshop on CryptographicHardware and Embedded Systems.[S.l.]:Springer-Verlag,2005:293-308.
  • 4Chari S,Jutla C,Rao J R,et al.A Cautionary Note RegardingEvaluation of AES Candidates on Smart-cards[C]//Proc.of the 2ndAES Candidate Conference.Rome,Italy:[s.n.],1999:133-147.
  • 5韩军,曾晓洋,赵佳.抗差分功耗分析和差分故障分析的AES算法VLSI设计与实现[J].通信学报,2010,31(1):20-29. 被引量:3
  • 6Fahn P N,Pearson P K.IPA:A New Class of PowerAttacks[C]//Proc.of Workshop on Cryptographic Hardware andEmbedded Systems.[S.l.]:Springer-Verlag,1999:173-186.
  • 7Chang Hwasun.A Study on Securing AES Against DiferentialPower Analysis[EB/OL].[2011-04-23].http://caislab.icu.ac.kr/pub/down/2004/w20022122_chs.pdf.
  • 8张翌维.抵御差分能量攻击的AES加密方法:中国,200810216907.6[P].2010-06-09.

二级参考文献13

  • 1National institute of standards and technology. FIPS 197: advanced encryption standard[EB/OL], http://csrc.nist.gov/publications/fips/ tips 197/tips- 197.pdf, 2001.
  • 2KOCHER P, JAFFE J, JUN B. Differential power analysis[A]. Advances in Cryptology CRYPTO 1999[C]. Springer, Santa Barbara, California, USA, 1999. 388-397.
  • 3BIHAM E, SHAMIR A. Differential fault analysis of secret key cryptosystems[A]. Proc. CRYPTO 1997[C]. Santa Barbara, California, USA, 1997.513-525.
  • 4BLOEMER J, SEIFERT J. Fault based cryptanalysis of the advanced encryption standard[EB/OL], http://www.iacr.org/eprint/2002/075.pdf, 2002.
  • 5AKKAR M, GIRAUD C. An implementation of DES and AES, secure against some attacks[A]. Proceedings of 3rd International Workshop on Cryptographic Hardware and Embedded Systems (CHES'01)[C]. Paris, France, 2001.309-318.
  • 6KARRI R, WU K, MISHRA P. Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers[J]. IEEE Trans Computer-Aided Design of Integrated Circuits and Systems, 2002.1509-1517.
  • 7KARRI R, KUZNETSOV G, GOESSEL M. Parity-based concurrent error detection of subsititution-permutation network block ciphers[A]. Proc Cryptographic Hardware and Embedded Systems (CHES '03)[C] Cologne, Germany, 2003. 113-124.
  • 8YEN C, WU B. Simple error detection methods for hardware implementation of advanced encryption standard[J]. IEEE Transitions on Computers, 2006, 55(6): 720-731.
  • 9OSWALD E, MANGARD S, PRAMSTALLER N. A side-channel analysis resistant description of the AES S-box[A]. The 12^th Fast Software Encryption Workshop (FSE'05)[C]. Portugal, 2005. 413-423.
  • 10MANGARD S. Hardware countermeasures against DPA -a statistical analysis of their effectiveness[A]. CT-RSA 2004[C]. Springer-Verlag, San Francisco, CA, USA, 2004. 222-235.

共引文献2

同被引文献27

  • 1白雪飞.抗功耗分析攻击的SMS4密码算法VLSI设计技术研究[D].合肥:中国科学技术大学,2008.
  • 2Kocher P,Jaffe J,Jun B.Differential Power Analysis. Advances in Cryptology - CRYPTO ’99, 19th Annual International Cryptology Conference . 1999
  • 3Mangard S,Oswald E,Popp T.Power analysis attacks: Revealing the secrets of smart cards. . 2008
  • 4Messerges T S.Securing the AES finalists against power analysis attacks. Fast Software Encryption . 2001
  • 5Kai Schramm,Christof Paar.Higher Order Masking of the AES. CT-RSA 2006 . 2006
  • 6Oswald E,Mangard S,Herbst C,et al.Practical second-order DPA attacks for masked smart card implementations of block ciphers. Topics in Cryptology-CT-RSA 2006 . 2006
  • 7Benedikt Gierlichs,Lejla Batina,Bart Preneel,Ingrid Verbauwhede.Revisiting Higher-Order DPA Attacks. Topics in Cryptology-CT-RSA 2010 . 2010
  • 8Kocher P,Jaffe J,Jun B,et al.Introduction to differential power analysis. Journal of Cryptographic Engineering . 2011
  • 9WANG S T,GU D W,LIU J R,et al.A Power Analysis on SMS4 Using the Chosen Plaintext Method. 2013 9th International Conference on Computational Intelligence and Security (CIS) . 2013
  • 10QIU S,BAI G Q.Power analysis of a FPGA implementation of SM4. 2014 International Conference on Computing Communication and Networking Technologies (ICCCNT) . 2014

引证文献3

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部