期刊文献+

基于塔域的通用循环移位掩码设计方法

Design Method of Generic Cyclic Shift Mask Based on Tower Field
下载PDF
导出
摘要 该文分析了塔域的运算特性,提出了基于塔域分解的非线性变换实现方法,设计了求逆运算的随机掩码方案,利用循环移位对随机掩码进行移位变换,形成了基于塔域的循环移位随机掩码方案,实现了所有中间值的随机化隐藏,提高了算法的抗能量攻击能力。该文在高级加密标准(AES)算法上进行验证,利用T-test和相关性分析对掩码方案进行安全性评估。该掩码方案无明显信息泄露点,可有效抵抗相关性攻击,另外较现有文献的掩码方案,资源开销更小,通用性更好。 The operation characteristics of the tower field is analyzed, a nonlinear transformation realization method based on the tower domain is proposed. A random mask schedule for the inversion operation is designed, and cyclic shift is used in the randomization of mask, forming cyclic shift random mask scheme based on the tower domain, realizing the randomized hiding of all intermediate values and improving the ability of the algorithm to resist power attacks. The method proposed is verified on the Advanced Encryption Standard(AES) algorithm with the use of T-test and correlation analysis to evaluate the security of the masking scheme.There is no obvious information leakage points in the schedule, proving the ability to effectively resist correlation attacks. In addition, compared with the mask schedule in existing reference, the mask schedule proposed in this paper has less resource overhead and better generality.
作者 严迎建 汪晶 刘燕江 YAN Yingjian;WANG Jing;LIU Yanjiang(Information Engineering University,People’s Liberation Army Strategic Support Force,Zhengzhou 450001,China)
出处 《电子与信息学报》 EI CSCD 北大核心 2021年第9期2489-2497,共9页 Journal of Electronics & Information Technology
关键词 能量攻击 掩码 复合域 分组密码 Power attack Mask Composite field Block cipher
  • 相关文献

参考文献4

二级参考文献29

  • 1National Institute of Standards and Technology.Advanced encryption standard (AES)[S/OL].[2013-06-20].http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.
  • 2Zhou Yongbin,Feng Dengguo.Side-channel attacks:ten years after its publication and the impacts on cryptographic module security testing,2005/388[R].[S.l.] :Cryptology ePrint Archive,2005.
  • 3Kocher P,Jaffe J,Jun B,et al.Introduction to differential power analysis[J].Journal of Cryptographic Engineering,2011,1(1):5-27.
  • 4Yoshikawa M,Sugiyama M.Multi-rounds masking method against DPA attacks[C] //Proc ofIEEE International Conference on Information Reuse and Integration.2011:100-103.
  • 5Yoshikawa M,Kojima Y.Efficient random number for the masking method against DPA attacks[C] //Proc of the 21st International Conference on Systems Engineering.2011:321-324.
  • 6Burns F,Bystrov A,Koelmans A,et al.Design and security evaluation of balanced 1-of-n circuits[J].IET Computers & Digital Techniques,2012,6(2):125-135.
  • 7Renauld M,Kamel D,Standaert F,et al.Information theoretic and security analysis of a 65-nanometer DDSLL AES S-box[C] //Cryptographic Hardware and Embedded Systems.2011:223-239.
  • 8Mangard S,Oswald E,Standaert F X.One for all-all for one:unifying standard differential power analysis attacks[J].IET Information Security,2011,5(2):100-110.
  • 9Bucci M,Luzzi R,Guglielmo M.A countermeasure against differential power analysis based on random delay insertion[C] //Proc of IEEE International Symposium on Circuits and Systems.2005:3547-3550.
  • 10Hoogvorst P,Duc G,Danger J L.Software implementation of dual-rail representation[C] //Proc of COSADE Workshop.2011.

共引文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部