期刊文献+

GIFT密码算法的二阶门限实现及其安全性评估 被引量:2

Second-order threshold implementation of GIFT cryptographic algorithm and security evaluation
下载PDF
导出
摘要 目前已知GIFT算法的防护方案仅能抗一阶功耗攻击。为了使该算法能抵御高阶功耗攻击,利用GIFT算法的数学结构,结合门限实现方法,构造了GIFT算法的二阶门限实现方案;针对非线性部件S盒的数学特征,分别构建(3,9),(6,7)以及(5,10)等二阶门限实现方案,并选取所需硬件资源最少的(3,9)方案,将其在FPGA平台下实现。在实现时,为了更好地分析对比所耗硬件资源,使用并行和串行的硬件实现方法。结果表明,在Nan Gate 45nm工艺库下,并行实现消耗的总面积为12 043 GE,串行实现消耗的总面积为6 373 GE。通过采集实际功耗曲线,利用T-test对该二阶门限实现方案进行侧信息泄露评估,证实了该二阶门限实现方案的安全性。 It is known that the protection scheme of the GIFT algorithm can only resist first-order power consumption attacks.In order to make the algorithm against high-order power attacks,this paper used the mathematical structure of GIFT algorithm and combined the threshold implementation method to construct a new second-order mask scheme of GIFT algorithm.According to the mathematical characteristics of the nonlinear part S-box,it constructed second-order threshold implementation schemes(3,9),(6,7) and(5,10) respectively,and selected the(3,9) scheme with the least required hardware resources and simulated it in FPGA environment.In the hardware implementation,in order to better analyze and compare the hardware resources consumed,it used the parallel and serial hardware implementation methods respectively.The results show that under the NanGate 45 nm open library process library,the total area consumed by the parallel implementation is 12 043 GE,and the total area consumed by the serial implementation is 6 373 GE.By collecting the actual power consumption curve,the T-test is used to evaluate the second-order threshold implementation scheme,which confirms the security of the second-order threshold implementation scheme.
作者 蒋宏然 韦永壮 史佳利 刘争红 Jiang Hongran;Wei Yongzhuang;Shi Jiali;Liu Zhenghong(Guangxi Key Laboratory of Cloud Computing&Complex System,Guilin University of Electronic Technology,Guilin Guangxi 541004,China;Guangxi Key Laboratory of Wireless Wideband Communication&Signal Processing,Guilin University of Electronic Technology,Guilin Guangxi 541004,China;Guangxi Key Laboratory of Cryptography&Information Security,Guilin University of Electronic Technology,Guilin Guangxi 541004,China;State Key Laboratory of Cryptology,Beijing 100878,China)
出处 《计算机应用研究》 CSCD 北大核心 2020年第8期2455-2459,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(61572148,61872103) 广西重点研发计划资助项目(2018AB16001) 桂林电子科技大学研究生教育创新计划资助项目(2018YJCX45) 广西研究生教育创新计划资助项目(YCBZ2018051) 桂林电子科技大学研究生优秀学位论文培育资助项目(16YJPYSS12)。
关键词 GIFT算法 功耗攻击 门限实现 芯片面积 T-TEST GIFT algorithm power attack threshold implementation chip area T-test
  • 相关文献

参考文献2

二级参考文献34

  • 1Beresford, Alastair R.,Stajano, Frank.Location privacy in pervasive computing. IEEE Pervasive Computing . 2003 被引量:2
  • 2Bellovin S M,Merritt M.Encrypted key exchange: Password-based protocols secure against dictionary attacks. Proceedings of the IEEE Symposium on Research in Security and Privacy . 1992 被引量:2
  • 3Boneh D,Gentry C,Lynn B,et al.Aggregate and verifiably encrypted signatures from bilinear maps. Advances in Cryptology-EUROCRYPT’03 . 2003 被引量:3
  • 4Rolf H. Weber.Internet of Things – New security and privacy challenges[J]. Computer Law and Security Review: The International Journal of Technology and Practice . 2010 (1) 被引量:2
  • 5Benjamin Fabian,Oliver Günther.Security challenges of the EPCglobal network[J]. Communications of the ACM . 2009 (7) 被引量:1
  • 6Dibyendu Chakrabarti,Subhamoy Maitra,Bimal Roy.A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design[J]. International Journal of Information Security . 2006 (2) 被引量:1
  • 7Juels A,Rivest RL,Szydlo M.The blocker tag:Selective blocking of RFID tags for consumer privacy. Proceedings of the 10th ACM Conference on Computerand Communications Security(CCS 2003) . 2003 被引量:2
  • 8BAUER K,LEE H.A distributed authentication scheme for a wire-less sensing system. ACM Transactions on Information and Sys-tem Security . 2008 被引量:1
  • 9Bellare M,Canetti R,Krawczyk H.Keyed Hash Functions and Message Authentication. Advances in Cryptology-CRYPIO’96 . 1996 被引量:1
  • 10C.Floerkemeier,M.Langheinrich,E.Fleisch,F.Mattern,S.E.Sarma."The Internet of Things,". First international conference,IOT 2008 . 2008 被引量:1

共引文献76

同被引文献8

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部