Implementation and optimization of s-box on AES based on secret sharing

被引:0
|
作者
Zhong W. [1 ,2 ]
Meng Q. [2 ]
Zhang S. [2 ]
Wang J. [1 ]
机构
[1] Key Lab. of Network and Info. Security of the Chinese Armed Police, Xi'an
[2] Dept. of Electronic Technol., Eng. College of the Chinese Armed Police Force, Xi'an
来源
Meng, Qingquan (pyw000107@yeah.net) | 2017年 / Sichuan University卷 / 49期
关键词
AES; First order DPA attack; Glitch attack; S-box; Secret sharing;
D O I
10.15961/j.jsuese.2017.01.025
中图分类号
学科分类号
摘要
DPA is widely used in the present as a new type of password attack technology, especially the most widely used glitch attack, which can break a large number of existing password program. In this paper, to resist DPA attacks especially glitch attacks, a new password structure of a low-consumption S-box based on AES was constructed by converting inputs into the composite field for seeking inverse, and converting them back to finite field for outputs. Then based on the idea of secret sharing, a new one was obtained by grouping S-box through the steps of affine transformation, inversion transformation and inverse-affine transformation. Compared to the classical scheme proposed by Nikova Svetla, the occupied space and consumption were reduced by using the method of correction terms. The analysis and experiments showed that the proposed scheme has better consumption characteristics, and the same level of resistance for first order DPA attack and glitch attack compared with the scheme of Nikova Svetla. © 2017, Editorial Department of Advanced Engineering Sciences. All right reserved.
引用
收藏
页码:191 / 196
页数:5
相关论文
共 17 条
  • [1] Bilgin B., Gierlichs B., Nikova S., Et al., A more efficient AES threshold implementation, Progress in Cryptology-FRICACRYPT 2014, pp. 267-284, (2014)
  • [2] Daemen J., Rijmen V., The Design of Rijndael: AES-The Advanced Encryption Standard, (2002)
  • [3] Kocher P., Jaffe J., Jun B., Differential power analysis, International Cryptology Conference on Advances in Cryptology, pp. 388-397, (1999)
  • [4] Bilgin B., Bogdanov A., Knezevic M., Et al., Fides: Lightweight authenticated cipher with side-channel resistance for constrained hardware, Cryptographic Hardware and Embedded Systems-CHES 2013, pp. 142-158, (2013)
  • [5] Bilgin B., Daemen J., Nikov V., Et al., Efficient and first-order DPA resistant implementations of keccak, Smart Card Research and Advanced Applications, pp. 187-199, (2013)
  • [6] Nikova S., Rechberger C., Rijmen V., Threshold implementations against side-channel attacks and glitches, International Conference on Information and Communications Security, pp. 529-545, (2006)
  • [7] Moradi A., Poschmann A., Ling S., Et al., Pushing the limits: A very compact and a threshold implementation of AES, Advances in Cryptology-EUROCRYPT 2011, pp. 69-88, (2011)
  • [8] Bilgin B., Nikov V., Nikova S., Et al., Threshold Implementations of all 3×3 and 4×4 S-boxes, Cryptographic Hardware and Embedded Systems-CHES 2012, pp. 76-91, (2012)
  • [9] Bilgin B., Nikova S., Nikov V., Et al., Threshold implementations of small S-boxes, Cryptography & Communications, 7, 1, pp. 3-33, (2014)
  • [10] Shamir A., How to share a secret, Communications of the Acm, 22, 11, pp. 612-613, (1979)