A Lightweight Implementation Scheme of Data Encryption Standard with Cyclic Mask

被引:4
|
作者
Wang Lihui [2 ]
Yan Shouli [2 ]
Li Qing [1 ,2 ]
机构
[1] Fudan Univ, State Key Lab ASIC & Syst, Shanghai 201203, Peoples R China
[2] Shanghai Fudan Microelect Grp Co Ltd, Shanghai 200433, Peoples R China
关键词
Data Encryption Standard(DES); Side channel attack; Mask; POWER-ANALYSIS; ATTACK;
D O I
10.11999/JEIT190870
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the continuous development of smart card technology, the security of smart card chip is facing more and more challenges. Among many encryption algorithms, Data Encryption Standard(DES) algorithm is a widely used symmetric encryption and decryption algorithm. In order to resist all kinds of side channel attacks, the most widely used method is to eliminate correlation of the real key and power consumption through the masking technology in the algorithm. A new cyclic mask scheme for DES is proposed. Compared with the pre-calculated mask scheme in the previous literature, not only the pre-calculation amount is greatly reduced, but also the intermediate data in the whole DES operation process is masked. After the mask is split, it can also protect against high-order attacks.
引用
收藏
页码:1828 / 1835
页数:8
相关论文
共 23 条
  • [1] Akkar M.-L., 2001, Cryptographic Hardware and Embedded Systems - CHES 2001. Third International Workshop. Proceedings (Lecture Notes in Computer Science Vol.2162), P309
  • [2] Akkar ML, 2004, LECT NOTES COMPUT SC, V3017, P332
  • [3] Akkar ML, 2003, LECT NOTES COMPUT SC, V2887, P192
  • [4] [Anonymous], 2006, FPL 2006
  • [5] Coron JS, 2009, LECT NOTES COMPUT SC, V5747, P156
  • [6] Coron JS, 1999, LECT NOTES COMPUT SC, V1717, P292
  • [7] Goubin L., 1999, Cryptographic Hardware and Embedded Systems. First International Workshop, CHES'99. Proceedings (Lecture Notes in Computer Science Volume 1717), P158
  • [8] Secured CAD back-end flow for power-analysis-resistant cryptoprocessors
    Guilley, Sylvain
    Flament, Florent
    Hoogvorst, Philippe
    Pacalet, Renaud
    Mathieu, Yves
    [J]. IEEE DESIGN & TEST OF COMPUTERS, 2007, 24 (06): : 546 - 555
  • [9] Random Addition-chain Based Countermeasure Against Side-channel Attack for Advanced Encryption Standard
    Huang Hai
    Feng Xinxin
    Liu Hongyu
    Hou Jiao
    Zhao Yuying
    Yin Lili
    Jiang Jinxing
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (02) : 348 - 354
  • [10] Itoh Kouichi, 2001, P INT C INF SEC CRYP, P440