摘要
目前已知GIFT算法的防护方案仅能抗一阶功耗攻击。为了使该算法能抵御高阶功耗攻击,利用GIFT算法的数学结构,结合门限实现方法,构造了GIFT算法的二阶门限实现方案;针对非线性部件S盒的数学特征,分别构建(3,9),(6,7)以及(5,10)等二阶门限实现方案,并选取所需硬件资源最少的(3,9)方案,将其在FPGA平台下实现。在实现时,为了更好地分析对比所耗硬件资源,使用并行和串行的硬件实现方法。结果表明,在Nan Gate 45nm工艺库下,并行实现消耗的总面积为12 043 GE,串行实现消耗的总面积为6 373 GE。通过采集实际功耗曲线,利用T-test对该二阶门限实现方案进行侧信息泄露评估,证实了该二阶门限实现方案的安全性。
It is known that the protection scheme of the GIFT algorithm can only resist first-order power consumption attacks.In order to make the algorithm against high-order power attacks,this paper used the mathematical structure of GIFT algorithm and combined the threshold implementation method to construct a new second-order mask scheme of GIFT algorithm.According to the mathematical characteristics of the nonlinear part S-box,it constructed second-order threshold implementation schemes(3,9),(6,7) and(5,10) respectively,and selected the(3,9) scheme with the least required hardware resources and simulated it in FPGA environment.In the hardware implementation,in order to better analyze and compare the hardware resources consumed,it used the parallel and serial hardware implementation methods respectively.The results show that under the NanGate 45 nm open library process library,the total area consumed by the parallel implementation is 12 043 GE,and the total area consumed by the serial implementation is 6 373 GE.By collecting the actual power consumption curve,the T-test is used to evaluate the second-order threshold implementation scheme,which confirms the security of the second-order threshold implementation scheme.
作者
蒋宏然
韦永壮
史佳利
刘争红
Jiang Hongran;Wei Yongzhuang;Shi Jiali;Liu Zhenghong(Guangxi Key Laboratory of Cloud Computing&Complex System,Guilin University of Electronic Technology,Guilin Guangxi 541004,China;Guangxi Key Laboratory of Wireless Wideband Communication&Signal Processing,Guilin University of Electronic Technology,Guilin Guangxi 541004,China;Guangxi Key Laboratory of Cryptography&Information Security,Guilin University of Electronic Technology,Guilin Guangxi 541004,China;State Key Laboratory of Cryptology,Beijing 100878,China)
出处
《计算机应用研究》
CSCD
北大核心
2020年第8期2455-2459,共5页
Application Research of Computers
基金
国家自然科学基金资助项目(61572148,61872103)
广西重点研发计划资助项目(2018AB16001)
桂林电子科技大学研究生教育创新计划资助项目(2018YJCX45)
广西研究生教育创新计划资助项目(YCBZ2018051)
桂林电子科技大学研究生优秀学位论文培育资助项目(16YJPYSS12)。