{"title":"根据塔场掩蔽方案检测一阶泄漏","authors":"Miao Yuan, Guoqiang Bai","doi":"10.1109/CITS.2016.7546450","DOIUrl":null,"url":null,"abstract":"A variety of masking schemes have been introduced to protect the block cipher. The critical technology lies on how to implement the nonlinear part with minimal resources. One popular way to solve this problem is using tower field representation. However, this idea always need two variables as inputs for conversion, which may result in suspicious first-order leakages during this operation. In this paper, we apply first-order attacks against variables of the conversion part based on simulation experiments to prove our speculation. The simulation results show that our proposed idea is more efficient than the second-order attacks in the noisy scenario.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Detecting first-order leakages against the tower field masking scheme\",\"authors\":\"Miao Yuan, Guoqiang Bai\",\"doi\":\"10.1109/CITS.2016.7546450\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A variety of masking schemes have been introduced to protect the block cipher. The critical technology lies on how to implement the nonlinear part with minimal resources. One popular way to solve this problem is using tower field representation. However, this idea always need two variables as inputs for conversion, which may result in suspicious first-order leakages during this operation. In this paper, we apply first-order attacks against variables of the conversion part based on simulation experiments to prove our speculation. The simulation results show that our proposed idea is more efficient than the second-order attacks in the noisy scenario.\",\"PeriodicalId\":340958,\"journal\":{\"name\":\"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-07-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CITS.2016.7546450\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CITS.2016.7546450","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Detecting first-order leakages against the tower field masking scheme
A variety of masking schemes have been introduced to protect the block cipher. The critical technology lies on how to implement the nonlinear part with minimal resources. One popular way to solve this problem is using tower field representation. However, this idea always need two variables as inputs for conversion, which may result in suspicious first-order leakages during this operation. In this paper, we apply first-order attacks against variables of the conversion part based on simulation experiments to prove our speculation. The simulation results show that our proposed idea is more efficient than the second-order attacks in the noisy scenario.