RLM:一种新的抗GIFT - HO-CPA掩码对策

Yueqing Li, Shihui Zheng
{"title":"RLM:一种新的抗GIFT - HO-CPA掩码对策","authors":"Yueqing Li, Shihui Zheng","doi":"10.1109/ICAIIS49377.2020.9194867","DOIUrl":null,"url":null,"abstract":"As a further development of the side channel technique, the security of crypto-chips has received extensive attention from researchers. A mask scheme based on a random number generator is usually used to protect crypto-chips, but it will result in extra memory and time consumption. How to balance the security of crypto-chips and the memory consumption has always been the research focus. In this paper, we use a random number generator to design a random loop mask scheme (RLM) for GIFT algorithm. The binary value of a random number is used to set the position and value of masks. In addition, the rotating S-box of the RSM scheme is combined with the small generation mask of a fixed mask scheme to make the RLM more secure. The experimental results show that the RLM scheme protects the intermediate values from being leaked. Compared to other common schemes, our RLM scheme could resist not only correlation power analysis (CPA) attacks but also higher-order correlation power analysis (HO-CP A) attacks. In addition, the RAM consumption was 49% less than that of the global mask scheme.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"RLM: a new mask countermeasure to resist HO-CPA for GIFT\",\"authors\":\"Yueqing Li, Shihui Zheng\",\"doi\":\"10.1109/ICAIIS49377.2020.9194867\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As a further development of the side channel technique, the security of crypto-chips has received extensive attention from researchers. A mask scheme based on a random number generator is usually used to protect crypto-chips, but it will result in extra memory and time consumption. How to balance the security of crypto-chips and the memory consumption has always been the research focus. In this paper, we use a random number generator to design a random loop mask scheme (RLM) for GIFT algorithm. The binary value of a random number is used to set the position and value of masks. In addition, the rotating S-box of the RSM scheme is combined with the small generation mask of a fixed mask scheme to make the RLM more secure. The experimental results show that the RLM scheme protects the intermediate values from being leaked. Compared to other common schemes, our RLM scheme could resist not only correlation power analysis (CPA) attacks but also higher-order correlation power analysis (HO-CP A) attacks. In addition, the RAM consumption was 49% less than that of the global mask scheme.\",\"PeriodicalId\":416002,\"journal\":{\"name\":\"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)\",\"volume\":\"85 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAIIS49377.2020.9194867\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAIIS49377.2020.9194867","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

作为侧信道技术的进一步发展,加密芯片的安全性受到了研究人员的广泛关注。通常使用基于随机数生成器的掩码方案来保护加密芯片,但它会导致额外的内存和时间消耗。如何平衡加密芯片的安全性和存储消耗一直是研究的热点。本文利用随机数生成器设计了GIFT算法的随机循环掩码方案(RLM)。随机数的二进制值用于设置掩码的位置和值。此外,RSM方案的旋转s盒与固定掩码方案的小生成掩码相结合,使RLM更加安全。实验结果表明,RLM方案保护了中间值不被泄露。与其他常用方案相比,我们的RLM方案不仅可以抵抗相关功率分析(CPA)攻击,还可以抵抗高阶相关功率分析(HO-CP A)攻击。此外,RAM消耗比全局掩码方案少49%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
RLM: a new mask countermeasure to resist HO-CPA for GIFT
As a further development of the side channel technique, the security of crypto-chips has received extensive attention from researchers. A mask scheme based on a random number generator is usually used to protect crypto-chips, but it will result in extra memory and time consumption. How to balance the security of crypto-chips and the memory consumption has always been the research focus. In this paper, we use a random number generator to design a random loop mask scheme (RLM) for GIFT algorithm. The binary value of a random number is used to set the position and value of masks. In addition, the rotating S-box of the RSM scheme is combined with the small generation mask of a fixed mask scheme to make the RLM more secure. The experimental results show that the RLM scheme protects the intermediate values from being leaked. Compared to other common schemes, our RLM scheme could resist not only correlation power analysis (CPA) attacks but also higher-order correlation power analysis (HO-CP A) attacks. In addition, the RAM consumption was 49% less than that of the global mask scheme.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Design of a 5G Multi-band Mobile Phone Antenna Based on CRLH-TL Decision Tree Generation Method in Intrusion Detection System High-speed Railway Timetabling Model based on Transfer Optimization Integrated Guidance and Control for Homing Missiles with Terminal Angular Constraint in Three Dimension Space Research on Stator-Core Temperature Characteristics under Static Air-Gap Eccentricity in Turbo-generator
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1