###
工程科学与技术:2017,49(1):191-196
本文二维码信息
码上扫一扫!
基于秘密共享的AES的S盒实现与优化
(1.网络与信息安全 武警部队重点实验室, 陕西 西安 710086;2.武警工程大学 电子技术系, 陕西 西安 710086)
Implementation and Optimization of S-box on AES Based on Secret Sharing
(1.Key Lab. of Network and Info. Security of the Chinese Armed Police, Xi'an 710086, China;2.Dept. of Electronic Technol., Eng. College of the Chinese Armed Police Force, Xi'an 710086, China)
摘要
图/表
参考文献
相似文献
本文已被:浏览 2405次   下载 1015
投稿时间:2016-09-18    修订日期:2016-10-30
中文摘要: 针对构建新的密码结构抵抗DPA攻击尤其是glitch攻击的问题,通过将输入变换到复合域GF(((2222)求逆,再变换回有限域GF(28)输出的方法构造了一个低消耗的AES的S盒;并基于秘密共享的思想分仿射变换、求逆变换、逆仿射变换3步对S盒进行分组,得到一个新的S盒。新的S盒在求逆变换中采用4×4的正确项分组法,相比于Nikova提出的经典方案,减少了实现所占用的空间,降低了消耗。通过分析验证,本文方案具有较为优良的消耗特性,且对1阶DPA攻击及glitch攻击具有与Nikova方案同等级的抵抗能力。
中文关键词: 秘密共享  AES  1阶DPA攻击  glitch攻击  S盒
Abstract:DPA is widely used in the present as a new type of password attack technology,especially the most widely used glitch attack,which can break a large number of existing password program. In this paper,to resist DPA attacks especially glitch attacks,a new password structure of a low-consumption S-box based on AES was constructed by converting inputs into the composite field for seeking inverse,and converting them back to finite field for outputs.Then based on the idea of secret sharing,a new one was obtained by grouping S-box through the steps of affine transformation,inversion transformation and inverse-affine transformation.Compared to the classical scheme proposed by Nikova Svetla,the occupied space and consumption were reduced by using the method of correction terms.The analysis and experiments showed that the proposed scheme has better consumption characteristics,and the same level of resistance for first order DPA attack and glitch attack compared with the scheme of Nikova Svetla.
文章编号:201601031     中图分类号:    文献标志码:
基金项目:国家自然科学基金资助项目(61272492;61103230)
作者简介:
引用文本:
钟卫东,孟庆全,张帅伟,汪晶晶.基于秘密共享的AES的S盒实现与优化[J].工程科学与技术,2017,49(1):191-196.
ZHONG Weidong,MENG Qingquan,ZHANG Shuaiwei,WANG Jingjing.Implementation and Optimization of S-box on AES Based on Secret Sharing[J].Advanced Engineering Sciences,2017,49(1):191-196.