全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
-  2018 

一种适用于SM4的改进RSM掩码方案

Keywords: SM4算法,侧信道攻击,循环移位S盒掩码,差分能量分析,S盒

Full-Text   Cite this paper   Add to My Lib

Abstract:

为了增强SM4算法抵御能量分析攻击,提出了一种改进的循环移位S盒掩码(RSM,rotating S-box masking)算法.该算法采用RSM掩码与固定值掩码相结合的方法,结合SM4算法本身的加密特性,不需要设计者对掩码进行人工操作,就可以起到循环移位S盒的目的,从而有效降低了功率消耗与中间值的关联性.安全性分析表明,本方案可以有效抵御高阶差分能量分析(DPA)攻击,是一个非常匹配SM4算法的掩码方案

References

[1]  KOCHER P,JAFFE J,JUN B.Differential power analysis[C]//Advances in Cryptology—CRYPTO'99.Berlin:Springer,1999:388-397.http://dx.doi.org/10.1007/3-540-48405-1_25.
[2]  罗鹏,冯登国,周永彬.功耗分析攻击中的功耗与数据相关性模型[J].通信学报,2012,33:276-281.LUO P,FENG D G,ZHOU Y B.Power model in power analysis attack[J].Journal on Communications,2012,33:276-281(Ch).
[3]  CHEN Z,ZHOU Y.Dual-rail random switching logic:A Countermeasure to Reduce Side Channel Leakage[C]//Cryptographic Hardware and Embedded Systems-CHES 2006.Berlin:Springer,2006:242-254.
[4]  WANG D H,WANG A,ZHENG X X.Fault-tolerant linear collision attack:A combination with correlation power analysis[C]//ISPEC 2014 Proceedings of the10th International Conference on Information Security Practice and Experience.New York:Springer-Verlag,2014:232-246.DOI:10.1007/978-3-319-06320-1_18.
[5]  GANDOLFI K,MOURTEL C,OLIVIER F.Electromagnetic analysis:Concrete results[C]//International Workshop on Cryptographic Hardware and Embedded Systems.Berlin:Springer,2001:251-261.
[6]  KOCHER P C.Timing attacks on implementations of Diffie-Hellman,RSA,DSS,and other systems[C]//Advances in Cryptology—CRYPTO'96.Berlin:Springer-Verlag,1996:104-113.
[7]  MANGARD S,OSWALD E,POPP T,et al.Power Analysis Attacks[M].New York:Springer,2008.
[8]  童元满,王志英,戴葵,等.一种抗DPA及HO-DPA攻击的AES算法实现技术[J].计算机研究与发展,2009,46(3):377-383.TONG Y M,WANG Z Y,DAI K,et al.A DPA and HO-DPA resistant implementation of AES[J].J ournal of Computer Research and Development.2009,46(3):377-383(Ch).
[9]  BRIER E,CLAVIER C,OLIVIER F.Correlation power analysis with a leakage model[C]//Cryptographic Hardware and Embedded Systems-CHES2004.Berlin:Springer,2004:16-29.http://dx.doi.org/10.1007/978-3-540-28632-5_2.
[10]  BAI X F,GUO L,XU YH,et al.Research on differential power analysis attack on SM4 algorithm[J].Journal of Chinese Computer Systems,2009,30(3):541-544.
[11]  TAN R N,LU YY,TIAN J L.SM4 muti-path multiplicative masking method against side-channel attack[J].Computer Engineering,2014,40(5):130-108.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133