汪晶,,
刘燕江
中国人民解放军战略支援部队信息工程大学 郑州 450001
详细信息
作者简介:严迎建:男,1973年生,教授,研究方向为安全专用芯片设计技术、侧信道分析等
汪晶:女,1997年生,硕士生,研究领域为安全专用芯片设计技术、侧信道分析
刘燕江:男,1990年生,博士后,研究领域为安全专用芯片设计技术、侧信道分析和硬件木马检测等
通讯作者:汪晶 cristal_97@163.com
中图分类号:TN918.4; TP309.7计量
文章访问数:202
HTML全文浏览量:89
PDF下载量:19
被引次数:0
出版历程
收稿日期:2021-06-16
修回日期:2021-07-15
网络出版日期:2021-08-18
刊出日期:2021-09-16
Design Method of Generic Cyclic Shift Mask Based on Tower Field
Yingjian YAN,Jing WANG,,
Yanjiang LIU
Information Engineering University, People’s Liberation Army Strategic Support Force, Zhengzhou 450001, China
摘要
摘要:该文分析了塔域的运算特性,提出了基于塔域分解的非线性变换实现方法,设计了求逆运算的随机掩码方案,利用循环移位对随机掩码进行移位变换,形成了基于塔域的循环移位随机掩码方案,实现了所有中间值的随机化隐藏,提高了算法的抗能量攻击能力。该文在高级加密标准(AES)算法上进行验证,利用T-test和相关性分析对掩码方案进行安全性评估。该掩码方案无明显信息泄露点,可有效抵抗相关性攻击,另外较现有文献的掩码方案,资源开销更小,通用性更好。
关键词:能量攻击/
掩码/
复合域/
分组密码
Abstract:The operation characteristics of the tower field is analyzed, a nonlinear transformation realization method based on the tower domain is proposed. A random mask schedule for the inversion operation is designed, and cyclic shift is used in the randomization of mask, forming cyclic shift random mask scheme based on the tower domain, realizing the randomized hiding of all intermediate values and improving the ability of the algorithm to resist power attacks. The method proposed is verified on the Advanced Encryption Standard (AES) algorithm with the use of T-test and correlation analysis to evaluate the security of the masking scheme. There is no obvious information leakage points in the schedule, proving the ability to effectively resist correlation attacks. In addition, compared with the mask schedule in existing reference, the mask schedule proposed in this paper has less resource overhead and better generality.
Key words:Power attack/
Mask/
Composite field/
Block cipher
PDF全文下载地址:
https://jeit.ac.cn/article/exportPdf?id=30e1f4e0-c9aa-4dd5-a30f-5f966404198e