期刊文献+

一种基于门限实现的SM4算法S盒实现方案 被引量:4

New S-box of SM4 based on threshold implementation
在线阅读 下载PDF
导出
摘要 针对SM4算法的安全实现面临DPA攻击严重威胁的问题,提出了一种新的SM4算法门限S盒实现方案。该方案基于门限实现技术,通过构造秘密共享函数代替仿射变换,将S盒输入和输出均分成2组进行处理。S盒输入经过秘密共享函数处理后,进入到复合域中进行求逆运算,并采用添加掩码的方法构造了符合门限实现技术分组性质的乘法器,提高了S盒的安全性。该方案在设计和实现过程中均满足门限实现技术对于分组数量和性质的要求,通过安全性分析和实验验证,能够抵御一阶DPA攻击,且具有较低的实现面积和功率消耗。 A new scheme of S-box is proposed to focus on the problem that SM4 algorithm faces a serious threat of DPA attack. The input and output of new S-box are divided into two groups by constructing a secret sharing function instead of the affine transformation. After the input through the secret sharing function, it performs inversion operation in the composite field. In order to improve the S-box security, the multiplier is constructed which satisfies grouping nature of threshold implementation by means of adding random mask to the output of multiplier. This scheme meets the requirements of grouping number and nature for threshold implementation in the S-box design and implementation. It can resist first-order DPA attack through security analysis and experimental verification, and has lower implementation area and power consumption.
作者 李新超 钟卫东 张帅伟 马双棚 LI Xinchao;ZHONG Weidong;ZHANG Shuaiwei;MA Shuangpeng(Key Laboratory of Network and Information Security of Chinese Armed Police Force,Engineering University of ChineseArmed Police Force,Xi’an 710086,China;College of Cryptographic Engineering,Engineering University of Chinese Armed Police Force,Xi’an 710086,China)
出处 《计算机工程与应用》 CSCD 北大核心 2018年第17期83-88,140,共7页 Computer Engineering and Applications
基金 国家自然科学基金(No.U1636114 No.61572521)
关键词 SM4 差分功耗分析(DPA) 门限实现 复合域 掩码 SM4 Differential Power Analysis(DPA) threshold implementation composite field mask
  • 相关文献

参考文献4

二级参考文献31

  • 1刘鸣,陈弘毅,白国强.功耗分析研究平台及其应用[J].微电子学与计算机,2005,22(7):134-138. 被引量:16
  • 2Kocher P,Jaffe J,Jun B.Differential Power Analysis. Advances in Cryptology - CRYPTO ’99, 19th Annual International Cryptology Conference . 1999
  • 3Mangard S,Oswald E,Popp T.Power analysis attacks: Revealing the secrets of smart cards. . 2008
  • 4Messerges T S.Securing the AES finalists against power analysis attacks. Fast Software Encryption . 2001
  • 5Kai Schramm,Christof Paar.Higher Order Masking of the AES. CT-RSA 2006 . 2006
  • 6Oswald E,Mangard S,Herbst C,et al.Practical second-order DPA attacks for masked smart card implementations of block ciphers. Topics in Cryptology-CT-RSA 2006 . 2006
  • 7Benedikt Gierlichs,Lejla Batina,Bart Preneel,Ingrid Verbauwhede.Revisiting Higher-Order DPA Attacks. Topics in Cryptology-CT-RSA 2010 . 2010
  • 8Kocher P,Jaffe J,Jun B,et al.Introduction to differential power analysis. Journal of Cryptographic Engineering . 2011
  • 9WANG S T,GU D W,LIU J R,et al.A Power Analysis on SMS4 Using the Chosen Plaintext Method. 2013 9th International Conference on Computational Intelligence and Security (CIS) . 2013
  • 10QIU S,BAI G Q.Power analysis of a FPGA implementation of SM4. 2014 International Conference on Computing Communication and Networking Technologies (ICCCNT) . 2014

共引文献99

同被引文献16

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部