期刊文献+

低面积复杂度AES低熵掩码方案的研究 被引量:5

Research on area-efficient low-entropy masking scheme for AES
下载PDF
导出
摘要 在Nassar等提出的循环移位S盒掩码方案(RSM)的基础上,提出了一种针对高级加密标准(AES)算法低熵掩码方案。该方案的核心思想是利用S盒共用思想降低面积复杂度,采用乱序技术提高系统安全性,并通过流水线技术提高系统的吞吐量。对于AES,所提方案可将其S盒的数量从16个降低为4个(不包括密钥扩展模块)。实验表明,与RSM相比,组合逻辑、时序逻辑和存储面积分别降低了69%、60%和80%,能够抵御基于偏移量CPA攻击,具有更高的安全性。 Based on the rotating S-box masking (RSM) proposed by Nassar et al, a low-entropy masking scheme for the advanced encryption standard (AES) was proposed. Reducing the area complexity by reusing the S-boxes, improving the hardware security by shuffling operation and improving the throughput by pipelining operation were the main idea of the proposed scheme. For the AES, the number of S-boxes could be reduced from 16 to 4 (key expansion module wasn't in- cluded). Compared with the RSM, the combinational logic, the dedicated logic and the memory size are reduced to 69%, 60% and 80% respectively. In addition, the theoretical analysis shows that the proposed scheme can resist offset based CPA attack, thus has higher security than the RSM.
作者 姜久兴 厚娇 黄海 赵玉迎 冯新新 JIANG Jiuxing;HOU Jiao;HUANG Hai;ZHAO Yuying;FENG Xinxin(School of Science, Harbin University of Science and Technology, Harbin 150080, China;School of Software and Microelectronics, Harbin University of Science and Technology, Harbin 150080, China;School of Computer Science and Technology, Harbin University of Science and Technology, Harbin 150080, China)
出处 《通信学报》 EI CSCD 北大核心 2019年第5期201-210,共10页 Journal on Communications
基金 国家自然科学基金资助项目(No.61604050 No.51672062)~~
关键词 循环移位S盒掩码方案 低熵掩码方案 S盒共用 高级加密标准 流水线 rotating S-box masking low-entropy masking scheme S-box reusing AES pipeline
  • 相关文献

参考文献3

二级参考文献48

  • 1赵佳,曾晓洋,韩军,陈俊.简化的抗零值功耗分析的AES算法及其VLSI实现[J].计算机工程,2007,33(16):220-222. 被引量:1
  • 2M Matsui. Linear cryptanalysis method for DES cipher[ A]. Advances in Cryptology, Proceedings of Eurocrypt ' 93 [ C ].Lofthus, Norway:Spfinger-Verlag. 1994.386 - 397.
  • 3J Daemen,L Knudsen, V Rijnmen. The block cipher Square[ A]. Fast So-ftware Encryption, Fourth International Workshop[ C]. Haifa, Israel:Springer-Verlag. 1997.149 - 165.
  • 4L R Knudsen. Block ciphers: state of the art[ R]. Copies of transparencies for lecture at the International Course on State of the Art and Evolution of Computer Security and Industrial Cryptography. Katholieke Unive-rsiteit Leuven, Belgium, 1997.
  • 5Y Hu, Y Zhang, G Xiao. Integral cryptanalysis of SAFER + [ J]. Electroni-es Letters, 1999,35(17) : 1458 - 1459.
  • 6L R Knudsen, D Wagner. Integral cryptanalysis [ EB ]. Available:https://www. cosic. esat. kuleuven, ac. be/nessie.
  • 7N Ferguson, J Kelsey, et al. Improv-ed cryptanalysis of Rijndael[ A].Fast Software Encryption, 7th lnternat-ional Workshop, FSE 2000[ C ].NewYork, USA: Springer-Verlag, 2001.213 - 230.
  • 8T Jakobsen, L Knudsen. The interpolation attack on block ciphers[ A].Fast software encryption, fouth international workshop[ C ]. Haifa, Israel: Springer-Verlag. 1997.28 - 40.
  • 9Paul Kocher, Joshua Jaffe, Benjamin Jun, Introduction to differential power analysis and related attacks[ EB]. Available: http://www. cryptography. com/dpa./technical.
  • 10P Kocher, J Jatte, B Jun. Differential power analysis[A]. Advanced in Cryptology-CRYPTO' 99 [ C ]. California, USA: Springer Verlag. 1999.388 - 397.

共引文献54

同被引文献14

引证文献5

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部