期刊导航

论文摘要

基于秘密共享的AES的S盒实现与优化

Implementation and Optimization of S-box on AES Based on Secret Sharing

作者:钟卫东(网络与信息安全 武警部队重点实验室, 陕西 西安 710086;武警工程大学 电子技术系, 陕西 西安 710086);孟庆全(武警工程大学 电子技术系, 陕西 西安 710086);张帅伟(武警工程大学 电子技术系, 陕西 西安 710086);汪晶晶(网络与信息安全 武警部队重点实验室, 陕西 西安 710086)

Author:ZHONG Weidong(Key Lab. of Network and Info. Security of the Chinese Armed Police, Xi'an 710086, China;Dept. of Electronic Technol., Eng. College of the Chinese Armed Police Force, Xi'an 710086, China);MENG Qingquan(Dept. of Electronic Technol., Eng. College of the Chinese Armed Police Force, Xi'an 710086, China);ZHANG Shuaiwei(Dept. of Electronic Technol., Eng. College of the Chinese Armed Police Force, Xi'an 710086, China);WANG Jingjing(Key Lab. of Network and Info. Security of the Chinese Armed Police, Xi'an 710086, China)

收稿日期:2016-09-18          年卷(期)页码:2017,49(1):191-196

期刊名称:工程科学与技术

Journal Name:Advanced Engineering Sciences

关键字:秘密共享;AES;1阶DPA攻击;glitch攻击;S盒

Key words:secret sharing;AES;first order DPA attack;glitch attack;S-box

基金项目:国家自然科学基金资助项目(61272492;61103230)

中文摘要

针对构建新的密码结构抵抗DPA攻击尤其是glitch攻击的问题,通过将输入变换到复合域GF(((22)2)2)求逆,再变换回有限域GF(28)输出的方法构造了一个低消耗的AES的S盒;并基于秘密共享的思想分仿射变换、求逆变换、逆仿射变换3步对S盒进行分组,得到一个新的S盒。新的S盒在求逆变换中采用4×4的正确项分组法,相比于Nikova提出的经典方案,减少了实现所占用的空间,降低了消耗。通过分析验证,本文方案具有较为优良的消耗特性,且对1阶DPA攻击及glitch攻击具有与Nikova方案同等级的抵抗能力。

英文摘要

DPA is widely used in the present as a new type of password attack technology,especially the most widely used glitch attack,which can break a large number of existing password program. In this paper,to resist DPA attacks especially glitch attacks,a new password structure of a low-consumption S-box based on AES was constructed by converting inputs into the composite field for seeking inverse,and converting them back to finite field for outputs.Then based on the idea of secret sharing,a new one was obtained by grouping S-box through the steps of affine transformation,inversion transformation and inverse-affine transformation.Compared to the classical scheme proposed by Nikova Svetla,the occupied space and consumption were reduced by using the method of correction terms.The analysis and experiments showed that the proposed scheme has better consumption characteristics,and the same level of resistance for first order DPA attack and glitch attack compared with the scheme of Nikova Svetla.

上一条:基于可执行代码的反污点分析方法研究

关闭

Copyright © 2020四川大学期刊社 版权所有.

地址:成都市一环路南一段24号

邮编:610065