期刊文献+

A secure and highly efficient first-order masking scheme for AES linear operations

原文传递
导出
摘要 Due to its provable security and remarkable device-independence,masking has been widely accepted as a noteworthy algorithmic-level countermeasure against side-channel attacks.However,relatively high cost of masking severely limits its applicability.Considering the high tackling complexity of non-linear operations,most masked AES implementations focus on the security and cost reduction of masked S-boxes.In this paper,we focus on linear operations,which seems to be underestimated,on the contrary.Specifically,we discover some security flaws and redundant processes in popular first-order masked AES linear operations,and pinpoint the underlying root causes.Then we propose a provably secure and highly efficient masking scheme for AES linear operations.In order to show its practical implications,we replace the linear operations of state-of-the-art first-order AES masking schemes with our proposal,while keeping their original non-linear operations unchanged.We implement four newly combined masking schemes on an Intel Core i7-4790 CPU,and the results show they are roughly 20%faster than those original ones.Then we select one masked implementation named RSMv2 due to its popularity,and investigate its security and efficiency on an AVR ATMega163 processor and four different FPGA devices.The results show that no exploitable first-order side-channel leakages are detected.Moreover,compared with original masked AES implementations,our combined approach is nearly 25%faster on the AVR processor,and at least 70%more efficient on four FPGA devices.
出处 《Cybersecurity》 EI CSCD 2021年第1期193-207,共15页 网络空间安全科学与技术(英文)
基金 National Natural Science Foundation of China(No.61632020,No.U1936209 and No.62002353) Beijing Natural Science Foundation(No.4192067).
  • 相关文献

参考文献1

二级参考文献10

  • 1张振权,罗新民,齐春.用AVR汇编语言实现AES及其优化[J].单片机与嵌入式系统应用,2005(8):27-29. 被引量:3
  • 2金晨辉 孙莹.AES密码算法S盒线性冗余研究.电子学报,2003,(10):1549-1553.
  • 3Deamon J,Rijmen V.AES Proposal:Rijndael,Version2[EB/OL].1999.
  • 4Brian Gladman,Implementions of AES(Rijndae)in C/C++and Assembler[EB/O L].
  • 5Daemen J,Knudsen L,Rijmen V.The Block Cipher Square[C]//Proc.of the 4th Intemational Workshop on Fast Software Encryption,Haifa,Israel.Spinger-Verlag,1997:149-165.
  • 6N Ferguson,J Kelsey,B Schneier,et al.Improved eryptanalysis of rijndael,selected area8 in cryptography 2003[M].Ottawa:Spinger Vedag,2004.
  • 7Ed Tittel,Mike Chapple,James 著;认证信息系统安全专家全息教程 CISSP:Certified Informa[M].电子工业出版社出版.2003.
  • 8杨中皇著.测试加密效率网络安全的理论与实务[M].2008.
  • 9S Lucks.Attacking seven munch of rijndael under 192-bit and 256-bit keys,the third advanced eneryption standard candidate conference[M].New York:Soringer Vedag.2000.
  • 10F Armknecht,Slucks.Linearity of the AESkeyschedule[M].Berlin:Springer,2005.159-169.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部