Journal of Computer Applications ›› 2023, Vol. 43 ›› Issue (11): 3490-3496.DOI: 10.11772/j.issn.1001-9081.2022101579
• Cyber security • Previous Articles
Jinwei PU, Qingjian GAO, Xin ZHENG(), Yinghui XU
Received:
2022-10-24
Revised:
2022-12-29
Accepted:
2023-01-03
Online:
2023-04-12
Published:
2023-11-10
Contact:
Xin ZHENG
About author:
PU Jinwei, born in 1998, M. S. candidate. His research interests include cryptographic algorithm side-channel protection.Supported by:
通讯作者:
郑欣
作者简介:
蒲金伟(1998—),男,重庆人,硕士研究生,主要研究方向:密码算法侧信道防护基金资助:
CLC Number:
Jinwei PU, Qingjian GAO, Xin ZHENG, Yinghui XU. SM4 resistant differential power analysis lightweight threshold implementation[J]. Journal of Computer Applications, 2023, 43(11): 3490-3496.
蒲金伟, 高倾健, 郑欣, 徐迎晖. SM4抗差分功耗分析轻量级门限实现[J]. 《计算机应用》唯一官方网站, 2023, 43(11): 3490-3496.
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.joca.cn/EN/10.11772/j.issn.1001-9081.2022101579
方案来源 | 面积/GE | 时钟数 | 随机数/bit | ATP | |
---|---|---|---|---|---|
compile | compile_ultra | ||||
文献[ | 18 709 | — | 160 | — | 59.86 |
文献[ | 28 000 | — | 160 | 58 | 89.60 |
文献[ | 22 000 | — | 192 | 108 | 84.40 |
本文方案 | 6 796 | 6 513 | 292 | 12 | 38.00 |
Tab. 1 Comparison of threshold implementation of SM4
方案来源 | 面积/GE | 时钟数 | 随机数/bit | ATP | |
---|---|---|---|---|---|
compile | compile_ultra | ||||
文献[ | 18 709 | — | 160 | — | 59.86 |
文献[ | 28 000 | — | 160 | 58 | 89.60 |
文献[ | 22 000 | — | 192 | 108 | 84.40 |
本文方案 | 6 796 | 6 513 | 292 | 12 | 38.00 |
模块 | 面积/GE | 模块 | 面积/GE | ||
---|---|---|---|---|---|
compile | compile_ultra | compile | compile_ultra | ||
门限S盒 | 2 197 | 2 095 | 控制模块 | 240 | 177 |
状态寄存器 | 2 682 | 2 603 | 门限SM4 | 6 796 | 6 513 |
密钥寄存器 | 1 677 | 1 638 |
Tab. 2 Module area of threshold implementation of SM4
模块 | 面积/GE | 模块 | 面积/GE | ||
---|---|---|---|---|---|
compile | compile_ultra | compile | compile_ultra | ||
门限S盒 | 2 197 | 2 095 | 控制模块 | 240 | 177 |
状态寄存器 | 2 682 | 2 603 | 门限SM4 | 6 796 | 6 513 |
密钥寄存器 | 1 677 | 1 638 |
1 | Office of State Commercial Cipher Administration. Block cipher for WLAN products — SMS4 [EB/OL]. [2022-03-21]. . |
2 | KOCHER P C. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems[C]// Proceedings of the 1996 Annual International Cryptology Conference, LNCS 1109. Cham: Springer, 1996: 104-113. |
3 | NIKOVA S, RECHBERGER C, RIJMEN V. Threshold implementations against side-channel attacks and glitches[C]// Proceedings of the 2006 International Conference on Information and Communications Security, LNCS 4307. Cham: Springer, 2006: 529-545. |
4 | BILGIN B, GIERLICHS B, NIKOVA S, et al. Trade-offs for threshold implementations illustrated on AES[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2015, 34(7): 1188-1200. 10.1109/tcad.2015.2419623 |
5 | LIU F, JI W, HU L, et al. Analysis of the SMS4 block cipher[C]// Proceedings of the 2007 Australasian Conference on Information Security and Privacy, LNCS 4586. Berlin: Springer, 2007: 158-170. |
6 | LIANG H, WU L J, ZHANG X M, et al. Design of a masked S-box for SM4 based on composite field[C]// Proceedings of the 10th International Conference on Computational Intelligence and Security. Piscataway: IEEE, 2014: 387-391. 10.1109/cis.2014.59 |
7 | 李新超,钟卫东,张帅伟,等.一种基于门限实现的SM4算法S盒实现方案[J].计算机工程与应用,2018,54(17):83-88. |
LI X C, ZHONG W D, ZHANG S W, et al. New S-box of SM4 based on threshold implementation [J]. Computer Engineering and Applications, 2018, 54(17): 83-88. | |
8 | 李新超,钟卫东,张帅伟,等.一种SM4算法S盒的门限实现方案[J].密码学报,2018,5(6):641-650. |
LI X C, ZHONG W D, ZHANG S W, et al. A new threshold implementation of the S-box in SM4[J]. Journal of Cryptologic Research, 2018, 5(6): 641-650. | |
9 | 武小年,李金林,潘晟,等.SM4算法门限掩码方案设计与实现[J].计算机应用研究,2022,39(2):572-576. |
WU X N, LI J L, PAN S, et al. Threshold masking schema design and implementation on SM4 algorithm[J]. Application Research of Computers.2022,39(2): 572-576. | |
10 | NIKOVA S, RIJMEN V, SCHLAFFER M. Secure hardware implementation of nonlinear functions in the presence of glitches[J]. Journal of Cryptology, 2011, 24(2): 292-321. 10.1007/s00145-010-9085-7 |
11 | BILGIN B, GIERLICHS B, NIKOVA S, et al. A more efficient AES threshold implementation[C]// Proceedings of the 2014 International Conference on Cryptology in Africa, LNCS 8469. Cham: Springer, 2014: 267-284. |
12 | DE CNUDDE T, REPARAZ O, BILGIN B, et al. Masking AES with d+1 shares in hardware[C]// Proceedings of the 2016 International Conference on Cryptographic Hardware and Embedded Systems, LNCS 9813. Berlin: Springer, 2016: 194-212. |
13 | WEI M, SUN S W, WEI Z H, et al. A small first-order DPA resistant AES implementation with no fresh randomness [J]. Science China Information Sciences, 2022, 65(6): No.169102. 10.1007/s11432-019-1469-7 |
14 | GROSS H, MANGARD S, KORAK T. Domain-oriented masking: compact masked hardware implementations with arbitrary protection order [C]// Proceedings of the 2016 ACM Workshop on Theory of Implementation Security. New York: ACM, 2016: 3. 10.1145/2996366.2996426 |
15 | SHANG M, ZHANG Q L, LIU Z B, et al. An ultra-compact hardware implementation of SMS4[C]// Proceedings of the 2014 IIAI 3rd International Conference on Advanced Applied Informatics. Piscataway: IEEE, 2014:86-90. 10.1109/iiai-aai.2014.28 |
16 | 郑朝霞,资义纯,吴旭峰,等.SMS4算法串行化设计及其轻量级电路实现[J].华中科技大学学报(自然科学版),2016,44(2):61-64. |
ZHENG Z X, ZI Y C, WU X F, et al. Serialized design of SMS4 and lightweight implement[J]. Journal of Huazhong University of Science and Technology (Nature Science Edition), 2016, 44(2): 61-64. | |
17 | BRIER E, CLAVIER C, OLIVIER F. Correlation power analysis with a leakage model [C]// Proceedings of the 6th International Workshop on Cryptographic Hardware and Embedded Systems, LNCS 3156. Berlin: Springer, 2004: 16-29. |
18 | ROY D B, BHASIN S, PATRANABIS S, et al. Testing of side-channel leakage of cryptographic intellectual properties: metrics and evaluations[M]// Hardware IP Security and Trust. Cham: Springer, 2017: 99-131. 10.1007/978-3-319-49025-0_6 |
[1] | Yipeng SHI, Jie LIU, Jinyuan ZU, Tao ZHANG, Guoqun ZHANG. Compact constraint analysis of SPONGENT S-box based on mixed integer linear programming model [J]. Journal of Computer Applications, 2023, 43(5): 1504-1510. |
[2] | Shanshan HUO, Yanjun LI, Jian LIU, Yinshuang LI. Design and implementation of cipher component security criteria testing tool [J]. Journal of Computer Applications, 2023, 43(10): 3156-3161. |
[3] | Jingwen CAI, Yongzhuang WEI, Zhenghong LIU. GPU-based method for evaluating algebraic properties of cryptographic S-boxes [J]. Journal of Computer Applications, 2022, 42(9): 2750-2756. |
[4] | Geng ZHAO, Senmin ZHANG, Yingjie MA, Shirui GAO. Design and analysis of dynamic S-box based on anti-degradation chaotic system [J]. Journal of Computer Applications, 2022, 42(10): 3069-3073. |
[5] | CONG Jing, WEI Yongzhuang, LIU Zhenghong. Stepwise correlation power analysis of SM4 cryptographic algorithm [J]. Journal of Computer Applications, 2020, 40(7): 1977-1982. |
[6] | ZHAO Ying, YE Tao, WEI Yongzhuang. New security analysis of several kinds of high-level cryptographical S-boxes [J]. Journal of Computer Applications, 2017, 37(9): 2572-2575. |
[7] | HU Zhihua, YAN Shuo, XIONG Kuanjiang. Dynamic S-box construction method and dynamic cryptography property analysis [J]. Journal of Computer Applications, 2016, 36(5): 1257-1261. |
[8] | FU Rong. Practical power analysis of smart card implementation of block cipher [J]. Journal of Computer Applications, 2015, 35(9): 2546-2552. |
[9] | QIN Guanjie, MA Jianshe, CHENG Xuemin. Method for increasing S-box nonlinearity based on combination of hill climbing [J]. Journal of Computer Applications, 2015, 35(8): 2195-2198. |
[10] | LI Lingchen, WEI Yongzhuang, ZHU Jialiang. Meet-in-the-middle attack on 11-round reduced 3D block cipher [J]. Journal of Computer Applications, 2015, 35(3): 700-703. |
[11] | XIONG Jie ZOU Changchun. Induction logging inversion algorithm based on differential evolution [J]. Journal of Computer Applications, 2014, 34(3): 911-914. |
[12] | CAI Zemin WANG Yi LI Renfa. Differential power analysis attack based on algebraic expression for power model [J]. Journal of Computer Applications, 2014, 34(2): 448-451. |
[13] | XU Kaiyong FANG Ming YANG Tianchi MENG Fanwei HUANG Huixin. Value-at-risk quantitative method about password chip under differential power analysis attacks [J]. Journal of Computer Applications, 2013, 33(06): 1642-1645. |
[14] | HE Yuan TIAN Simei. Block encryption algorithm based on chaotic S-box for wireless sensor network [J]. Journal of Computer Applications, 2013, 33(04): 1081-1084. |
[15] | . Construction method of S-box suitable for hardware implementation [J]. Journal of Computer Applications, 2010, 30(3): 674-676. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||