期刊文献+

基于秘密共享的AES的S盒实现与优化 被引量:7

Implementation and Optimization of S-box on AES Based on Secret Sharing
下载PDF
导出
摘要 针对构建新的密码结构抵抗DPA攻击尤其是glitch攻击的问题,通过将输入变换到复合域GF(((22)2)2)求逆,再变换回有限域GF(28)输出的方法构造了一个低消耗的AES的S盒;并基于秘密共享的思想分仿射变换、求逆变换、逆仿射变换3步对S盒进行分组,得到一个新的S盒。新的S盒在求逆变换中采用4×4的正确项分组法,相比于Nikova提出的经典方案,减少了实现所占用的空间,降低了消耗。通过分析验证,本文方案具有较为优良的消耗特性,且对1阶DPA攻击及glitch攻击具有与Nikova方案同等级的抵抗能力。 DPA is widely used in the present as a new type of password attack technology, especially the most widely used glitch attack, which can break a large number of existing password program. In this paper, to resist DPA attacks especially glitch attacks, a new password structure of a low-consumption S-box based on AES was constructed by converting inputs into the composite field for seeking inverse, and converting them back to finite field for outputs. Then based on the idea of secret sharing, a new one was obtained by grouping S-box through the steps of affine transformation, inversion transformation and inverse-affine transformation. Compared to the classical scheme proposed by Nikova Svetla,the occupied space and consumption were reduced by using the method of correction terms. The analysis and experiments showed that the proposed scheme has better consumption characteristics, and the same level of resistance for first order DPA attack and glitch attack compared with the scheme of Nikova Svetla.
出处 《工程科学与技术》 EI CAS CSCD 北大核心 2017年第1期191-196,共6页 Advanced Engineering Sciences
基金 国家自然科学基金资助项目(61272492 61103230)
关键词 秘密共享 AES 1阶DPA攻击 glitch攻击 S盒 secret sharing AES first order DPA attack glitch attack S-box
  • 相关文献

同被引文献23

引证文献7

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部