摘要
针对构建新的密码结构抵抗DPA攻击尤其是glitch攻击的问题,通过将输入变换到复合域GF(((22)2)2)求逆,再变换回有限域GF(28)输出的方法构造了一个低消耗的AES的S盒;并基于秘密共享的思想分仿射变换、求逆变换、逆仿射变换3步对S盒进行分组,得到一个新的S盒。新的S盒在求逆变换中采用4×4的正确项分组法,相比于Nikova提出的经典方案,减少了实现所占用的空间,降低了消耗。通过分析验证,本文方案具有较为优良的消耗特性,且对1阶DPA攻击及glitch攻击具有与Nikova方案同等级的抵抗能力。
DPA is widely used in the present as a new type of password attack technology, especially the most widely used glitch attack, which can break a large number of existing password program. In this paper, to resist DPA attacks especially glitch attacks, a new password structure of a low-consumption S-box based on AES was constructed by converting inputs into the composite field for seeking inverse, and converting them back to finite field for outputs. Then based on the idea of secret sharing, a new one was obtained by grouping S-box through the steps of affine transformation, inversion transformation and inverse-affine transformation. Compared to the classical scheme proposed by Nikova Svetla,the occupied space and consumption were reduced by using the method of correction terms. The analysis and experiments showed that the proposed scheme has better consumption characteristics, and the same level of resistance for first order DPA attack and glitch attack compared with the scheme of Nikova Svetla.
出处
《工程科学与技术》
EI
CAS
CSCD
北大核心
2017年第1期191-196,共6页
Advanced Engineering Sciences
基金
国家自然科学基金资助项目(61272492
61103230)