期刊文献+

一种低功耗抗差分功耗分析攻击的SM4算法实现 被引量:4

A Low Power Implementation of SM4 Cipher with Resistance to Differential Power Analysis Attack
下载PDF
导出
摘要 128位的SM4算法是我国公布的第一个商用密码算法,主要应用于无线局域网.为了提高算法的抗差分功耗分析攻击能力,SM4算法采用了加法掩码的方法来抵抗一阶差分功耗分析攻击.通过功耗分析攻击实心眼可以发现,加法掩码后的SM4算法能够有效地抵抗差分功耗分析攻击.为了实现一款面积小、功耗低SM4算法硬件电路,SM4S盒硬件电路采用了PPRM结构.在SMIC 0.18μm的工艺库下功耗仿真值为0.74mW@10MHz,PPRM结构的S盒与复合域方法实现的S盒相比功耗减少了70%. The 128-bit SM4 algorithm is the first commercial cipher published by China,which is mainly used in wireless LAN.In order to improve the algorithm's resistance to differential power analysis attack,the additive masking is adopted to keep the SM4 cipher resistant to the first-order DPA.The simulation results show that the counteractive against differential power analysis attack is credible.In order to realize a small-area,low-power circuit of SM4 cipher,the PPRM architecture is adopted in the hardware implementation of SM4S-box.A power consumption of 0.74mW@10MHz using SMIC 0.18μm technology is achieved,which is 70% less than that of the SM4S-Box in composite field.
出处 《微电子学与计算机》 CSCD 北大核心 2014年第9期28-32,38,共6页 Microelectronics & Computer
关键词 SM4算法 S盒 PPRM结构 加法掩码 SM4-cipher S-box PPRM architecture additive masking
  • 相关文献

参考文献3

二级参考文献9

  • 1张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602. 被引量:67
  • 2L T Mc Daniel. An Investigation of Differential Power Analysis Attacks on FPGA-based Encryption Systems.Master Thesis, Virginia Polytechnic Institute and State University, 2003, 29.
  • 3S B Ors, F Gurkaynak, E Oswald, B Preneel, Power-Analysis Attacks on an FPGA - First Experimental Results. CD. Walter et al. (Eds.): Cryptographic Hardware and Embedded Systems - CHES 2003, LNCS 2779,2003, 35-50.
  • 4S B Ors, F Gurkaynak, E Oswald B. Preneel Power-Analysis Attack on an ASIC AES implementation, in the proceedings of ITCC 2004, Las Vegas, 2004: 5-7.
  • 5P Kocher, J Jaffe, B Jun. Differential Power Analysis and Related Attacks. Technical Report,Cryptography Research Inc., 1998. Available from http://www.cryptography.com/dpa/technicla/index.
  • 6J S Coron, P Kocher, D Naccache. Stattics and Secret Leakage. In Finiancial Cryptography'00,2000.
  • 7C Clavier, J S Coron, N Dabbous. Differential Power Analysis in the Presence of Hardware Countermeasures. In C.K. Koc and C. Paar,editors,Cryptographic Hardware and Embedded Systems - CHES 2000,volume 1965 of LNCS, Springle-Verlag, August 2000, 252-263.
  • 8E Brier, C Clavier, F Oliver. Optimal Statistical Power Analysis. IACR e-print archive 2003, 152.
  • 9童元满,王志英,戴葵,陆洪毅.识别密码算法具体实现中潜在功耗攻击的理论分析方法[J].计算机辅助设计与图形学学报,2008,20(3):395-402. 被引量:8

共引文献27

同被引文献12

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部