首页 | 本学科首页   官方微博 | 高级检索  
     

基于复合域通用低熵高阶掩码的设计与实现
引用本文:姜久兴,赵玉迎,黄海,谢光辉,厚娇,冯新新.基于复合域通用低熵高阶掩码的设计与实现[J].电子与信息学报,2020,42(3):779-786.
作者姓名:姜久兴  赵玉迎  黄海  谢光辉  厚娇  冯新新
作者单位:1.哈尔滨理工大学理学院 哈尔滨 1500802.哈尔滨理工大学软件与微电子学院 哈尔滨 1500803.哈尔滨理工大学计算机科学与技术学院 哈尔滨 150040
基金项目:国家自然科学基金(61604050, 51672062),黑龙江省普通本科高等学校青年创新人才培养计划(UNPYSCT-2017081),黑龙江省博士后科研启动基金(LBH-Q18065)
摘    要:通过对基于复合域S-box构造算法的深入研究,该文提出一种低面积复杂度的通用低熵高阶掩码算法。在有限域GF(24)上引入低熵掩码思想,并采用部分模块复用设计,有效降低了基于复合域S-box求逆运算的乘法数量。该算法能够适用于由求逆运算构成的任意分组加密算法,进一步将本方案应用于分组加密算法高级加密标准(AES),给出了详细的综合仿真结果并进行了版图面积优化,较传统的掩码方案相比有效减少了逻辑资源的使用,此外,对其安全性进行了理论验证。

关 键 词:高阶掩码    复合域算法    S-box    低熵    高级加密标准
收稿时间:2019-04-16

Design and Implementation of Generic Low-entropy High-order Composite Field Based Masking Scheme
Jiuxing JIANG,Yuying ZHAO,Hai HUANG,Guanghui XIE,Jiao HOU,Xinxin FENG.Design and Implementation of Generic Low-entropy High-order Composite Field Based Masking Scheme[J].Journal of Electronics & Information Technology,2020,42(3):779-786.
Authors:Jiuxing JIANG  Yuying ZHAO  Hai HUANG  Guanghui XIE  Jiao HOU  Xinxin FENG
Affiliation:1.School of Sciences, Harbin University of Science and Technology, Harbin 150080, China2.School of Software and Microelectronics, Harbin University of Science and Technology, Harbin 150080, China3.School of Computer Sciences and Technology, Harbin University of Science and Technology, Harbin 150040, China
Abstract:Based on the in-depth research on the S-box constitution arithmetic of composite, an area optimized generic low-entropy higher-order masking scheme is proposed in this paper. The low entropy masking method is introduced on GF(24), and the partial module reusing design is adopted, which reduces effectively the number of multiplications based on the S-box inversion operation of the composite. The algorithm can be applied to any order masking scheme of arbitrary S-box composed of inversion operation. This scheme is applied  to AES, gives detailed simulation results and optimizes the layout area, compared with the traditional masking scheme, reduces effectively the use of logical resources. In addition, the security is theoretically proved.
Keywords:
点击此处可从《电子与信息学报》浏览原始摘要信息
点击此处可从《电子与信息学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号