期刊文献+

基于复合域通用低熵高阶掩码的设计与实现

Design and Implementation of Generic Low-entropy High-order Composite Field Based Masking Scheme
下载PDF
导出
摘要 通过对基于复合域S-box构造算法的深入研究,该文提出一种低面积复杂度的通用低熵高阶掩码算法。在有限域GF(24)上引入低熵掩码思想,并采用部分模块复用设计,有效降低了基于复合域S-box求逆运算的乘法数量。该算法能够适用于由求逆运算构成的任意分组加密算法,进一步将本方案应用于分组加密算法高级加密标准(AES),给出了详细的综合仿真结果并进行了版图面积优化,较传统的掩码方案相比有效减少了逻辑资源的使用,此外,对其安全性进行了理论验证。 Based on the in-depth research on the S-box constitution arithmetic of composite, an area optimized generic low-entropy higher-order masking scheme is proposed in this paper. The low entropy masking method is introduced on GF(24), and the partial module reusing design is adopted, which reduces effectively the number of multiplications based on the S-box inversion operation of the composite. The algorithm can be applied to any order masking scheme of arbitrary S-box composed of inversion operation. This scheme is applied to AES, gives detailed simulation results and optimizes the layout area, compared with the traditional masking scheme,reduces effectively the use of logical resources. In addition, the security is theoretically proved.
作者 姜久兴① 赵玉迎① 黄海 谢光辉② 厚娇① 冯新新 JIANG Jiuxing;ZHAO Yuying;HUANG Hai;XIE Guanghui;HOU Jiao;FENG Xinxin(School of Sciences,Harbin University of Science and Technology,Harbin 150080,China;School of Software and Microelectronics,Harbin University of Science and Technology,Harbin 150080,China;School of Computer Sciences and Technology,Harbin University of Science and Technology,Harbin 150040,China)
出处 《电子与信息学报》 EI CSCD 北大核心 2020年第3期779-786,共8页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61604050,51672062) 黑龙江省普通本科高等学校青年创新人才培养计划(UNPYSCT-2017081) 黑龙江省博士后科研启动基金(LBH-Q18065)~~
关键词 高阶掩码 复合域算法 S-BOX 低熵 高级加密标准 High-order masking Composite arithmetic S-box Low entropy Advanced Encryption Standard(AES)
  • 相关文献

参考文献6

二级参考文献115

  • 1黄凯明.滑动平均数字滤波参数研究[J].集美大学学报(自然科学版),2006,11(4):381-384. 被引量:21
  • 2赵佳,曾晓洋,韩军,王晶,陈俊.抗差分功耗分析攻击的AES算法的VLSI实现[J].计算机研究与发展,2007,44(3):378-383. 被引量:7
  • 3赵佳,曾晓洋,韩军,陈俊.简化的抗零值功耗分析的AES算法及其VLSI实现[J].计算机工程,2007,33(16):220-222. 被引量:1
  • 4Mangard S, Oswald E, and Popp T. Power Analysis Attacks: Revealing the Secrets of Smart Cards[M]. Graz University of Technology, Austria, Published by Springer, 2007: 1-306.
  • 5Kocher P C. Timing attacks on implementations of Diffie- Hellman, RSA, DSS, and other systems[C]. Advances in Cryptology(CRYPTO'96), Berlin, Springer, 1996, LNCS 1109: 104-113.
  • 6Kocher P C, Jaffe J, Jun B, et al.. Differential power analysis [C]. CRYPTO'99, Santa Barbara, CA, USA, Lecture Notes in Computer Science, Aug. 15-19, 1999: 388-397.
  • 7Gandolfi K, Mourtel C, and Olivier F. Electromagnetic analysis: concrete results[C]. CHES 2001, 2001, LNCS 2162: 251-261.
  • 8Alioto M, Poli M, and Rocchi S. A general power model of differential power analysis attacks to static logic circuits [J]. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2010, 18(5): 711-724.
  • 9Wang Peng-jun and Hao Li-peng. A novel differential fault analysis on AES-128[C]. 2011 IEEE 9th International Conference on ASIC (ASICON), Xiamen, China, Oct. 25-28, 2011: 9-12.
  • 10Lu Y, Boey K, Hodgers P, et al.. Lightweight DPA resistant solution on FPGA to counteract power models[C]. 2010 International Conference on Field-Programmable Technology (FPT), Beijing, China, Dec. 8-10, 2010: 178-183.

共引文献44

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部