期刊文献+

一种基于门限与感染技术的SM4算法综合防护实现 被引量:1

A Comprehensive Protection Implementation of SM4 Algorithm Based on Threshold and Infection Technology
下载PDF
导出
摘要 侧信道攻击和故障攻击对于密码算法的实现安全性有着巨大的威胁.针对这样的现状,本文结合门限实现和乘法感染防护思想构造了一种具有抵抗侧信道攻击和故障攻击能力的综合防护方案,以门限实现思想为基础实现了对于侧信道攻击的防护,以乘法感染思想为基础实现了对于故障攻击的防护,二者相互结合使得综合防护方案同时具有抵抗侧信道攻击和故障攻击的能力.此外以门限实现改善了乘法感染防护中随机数为0的缺陷,并且结合随机置换思想进一步提高了防护方案抵抗故障攻击的能力.随后本文依据以上综合防护理论构造了一种适用于SM4算法的综合防护实现方案,并在现场可编程门阵列(Field Programmable Gate Array,FPGA)上进行了具体的实现,最后通过理论分析和安全性评估实验验证了该综合防护方案的安全性. Side channel attack and fault attack are great threats to the security of cryptography implementation.In view of this situation,this paper combines the threshold implementation(TI)and multiplicative infection protection idea to construct a comprehensive protection scheme with the ability to resist side channel attack and fault attack.Based on the idea of threshold implementation,the protection against side channel attack is realized.Based on the idea of multiplicative infection,the protection against fault attack is realized.The combination of the two theory makes the comprehensive protection scheme capable of resisting side channel attack and fault attack at the same time.In addition,threshold implementation improves the flaw of multiplicative infection when the random number is 0,and the ability of the protection scheme to resist fault attack is further improved by combining the idea of random permutation.Then,based on the above comprehensive protection theory,this paper constructs a comprehensive protection implementation scheme suitable for SM4 algorithm,and carries out a specific implementation on field programmable gate array(FPGA).Finally,the security of the comprehensive protection scheme is verified through theoretical analysis and security evaluation experiments.
作者 焦志鹏 姚富 陈华 王舰 匡晓云 黄开天 JIAO Zhi-peng;YAO Fu;CHEN Hua;WANG Jian;KUANG Xiao-yun;HUANG Kai-tian(Trusted Computing and Information Assurance Laboratory,Institute of Software,Chinese Academy of Sciences,Beijing 100190,China;University of Chinese Academy of Sciences,Beijing 100049,China;Electric Power Research Institute,China Southern Power Grid,Guangzhou,Guangdong 510663,China)
出处 《电子学报》 EI CAS CSCD 北大核心 2022年第5期1066-1074,共9页 Acta Electronica Sinica
基金 国家重点研发计划(No.2018YFB0904900,No.2018YFB0904901)。
关键词 侧信道攻击 故障攻击 门限实现 感染 综合防护 SM4算法 side channel attack fault attack threshold implementation infection comprehensive protection SM4 algorithm
  • 相关文献

参考文献6

二级参考文献38

  • 1白雪飞.抗功耗分析攻击的SMS4密码算法VLSI设计技术研究[D].合肥:中国科学技术大学,2008. 被引量:1
  • 2Kocher P,Jaffe J,Jun B.Differential Power Analysis. Advances in Cryptology - CRYPTO ’99, 19th Annual International Cryptology Conference . 1999 被引量:2
  • 3Mangard S,Oswald E,Popp T.Power analysis attacks: Revealing the secrets of smart cards. . 2008 被引量:1
  • 4Messerges T S.Securing the AES finalists against power analysis attacks. Fast Software Encryption . 2001 被引量:1
  • 5Kai Schramm,Christof Paar.Higher Order Masking of the AES. CT-RSA 2006 . 2006 被引量:1
  • 6Oswald E,Mangard S,Herbst C,et al.Practical second-order DPA attacks for masked smart card implementations of block ciphers. Topics in Cryptology-CT-RSA 2006 . 2006 被引量:1
  • 7Benedikt Gierlichs,Lejla Batina,Bart Preneel,Ingrid Verbauwhede.Revisiting Higher-Order DPA Attacks. Topics in Cryptology-CT-RSA 2010 . 2010 被引量:1
  • 8Kocher P,Jaffe J,Jun B,et al.Introduction to differential power analysis. Journal of Cryptographic Engineering . 2011 被引量:1
  • 9WANG S T,GU D W,LIU J R,et al.A Power Analysis on SMS4 Using the Chosen Plaintext Method. 2013 9th International Conference on Computational Intelligence and Security (CIS) . 2013 被引量:1
  • 10QIU S,BAI G Q.Power analysis of a FPGA implementation of SM4. 2014 International Conference on Computing Communication and Networking Technologies (ICCCNT) . 2014 被引量:1

共引文献92

同被引文献8

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部