首页 | 本学科首页   官方微博 | 高级检索  
     

自动化门限掩码新方法
引用本文:杨蕊涵,韦永壮,李灵琛. 自动化门限掩码新方法[J]. 计算机应用研究, 2022, 39(5). DOI: 10.19734/j.issn.1001-3695.2021.10.0470
作者姓名:杨蕊涵  韦永壮  李灵琛
作者单位:桂林电子科技大学广西密码学与信息安全重点实验室,广西桂林541004
基金项目:广西科技基地和人才专项资助项目;广西青年科学基金资助项目;广西创新研究团队项目;国家自然科学基金
摘    要:为了有效抵御差分功耗攻击,密码芯片通常在算法级使用掩码防护。现有的门限掩码方法主要依赖于手工对密码核心部件的分解、推算及随机比特数的配置,其明显的缺点是计算及验证过程复杂、烦琐,而且掩码方案实现效率往往较低。如何在不注入额外随机数的情况下,自动化地生成掩码方案是目前业界讨论的热点问题。基于依赖函数的最小共享数目提出一种自动化门限掩码新方法。该方法仅需在拆分变元时用到随机数,而其他掩码环节不需引入额外随机数。实验结果表明:该方法应用于轻量级密码LBlock算法及16类最优4 bit密码S盒上的一阶门限掩码防护时,其T-test的峰值较于不加防护情形下的峰值缩小10倍以上;在实际平台的差分功耗攻击下,使用100万条能量迹也无法恢复出LBlock密码算法的任何密钥比特。这证实该掩码防护是新型有效的。此外,针对SKINNY、Midori、PRESENT和PRINCE等轻量级密码算法使用的密码S盒还分别给出其一阶自动化门限掩码新方案。

关 键 词:侧信道分析  差分功耗攻击  门限掩码  LBlock  自动化掩码
收稿时间:2021-10-18
修稿时间:2022-04-19

New method of automatic threshold masking
YANG Ruihan,WEI Yongzhuang and LI Lingchen. New method of automatic threshold masking[J]. Application Research of Computers, 2022, 39(5). DOI: 10.19734/j.issn.1001-3695.2021.10.0470
Authors:YANG Ruihan  WEI Yongzhuang  LI Lingchen
Affiliation:Guangxi Key Laboratory of Cryptography and Information Security,Guilin University of Electronic Technology,,
Abstract:In order to effectively against differential power attacks(DPA), masking schemes are usually used to protect the cryptographic primitives at the algorithm level. The existing threshold implementations mainly relies on the manual decomposition, calculation of the core components of the cryptography and the configuration of fresh randomness. Its obvious disadvantage regarding to both the calculation and verification process is quite complicated and cumbersome. In particular, the realization efficiency of these masking schemes is rather low. How to automatically generate a mask scheme without any fresh randomness appears to be a hot issue currently discussed in the industry. This paper proposed a new automatic threshold implementation, which was based on the minimum shared number of dependent functions. More precisely, random numbers of this scheme were only inserted in the variable decomposition phase. The experimental results illustrates that the peak value of T-test is reduced by more than 10 times(compared with the original peak value without protection), where the method was applied to the lightweight encryption algorithm LBlock, and 16 different optimal 4 bit S-boxes. On the other hand, in the practical DPA scenario and simulation platform, any users secret key bits of LBlock encryption algorithm cannot be captured even using 1 million power traces. This directly means that the mask protection scheme is rather effective. Similarly, this paper also presented an automation technique to design the first-order masked implementation schemes without any fresh randomness for the S-boxes used in SKINNY, Midori, PRESENT, and PRINCE encryption ciphers.
Keywords:side channel analysis   differential power attack   threshold mask   LBlock   automated mask protection
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机应用研究》浏览原始摘要信息
点击此处可从《计算机应用研究》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号