The Research of Nonlinear Operation in Block Ciphers with Resistance against ASCAs

来源 :中国密码学会2013年密码芯片学术会议 | 被引量 : 0次 | 上传用户:hughy
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  As a combination of algebraic attacks and side channel attacks, the ASCA (Algebraic Side-Channel Attack) has become a very effective attack against block ciphers.From cryptographic designers point of view, the knowledge of the minimal number of rounds needed in ASCAs will be helpful to improve the design of cryptographic algorithms by means of a few lightweight countermeasures.However, there is still neither a method to evaluate the minimal number of rounds needed in ASCAs nor a security index to characterize the resistance against ASCAs up to now.In this paper, based on information theory, a method to evaluate the security of block ciphers against ASCAs under the Hamming weight model has been in vestigated.Relying on the above evaluation method, we further propose a security index referred to as HWE (Hamming Weight Extension) to measure the resistance of nonlinear operations and round functions of block ciphers to ASCAs.Furthermore, we show that the HWE and another important cryptographic index, nonlinearity, are restricted mutually when ASCAs and linear analyses are taken account of simultaneously.Finally we perform experiment with the MIBS algorithm, and need to iterate at least 4 rounds of the MIBS to gnarantee that the HWEs of both nonlinear operations and round func tions are nonzero, which are in consistency with our theoretical anaiyses.
其他文献
本文分别介绍了常规防磨补救方法喷涂、防护梁防磨和导流板加装等循环液化床锅炉磨损补救方法,分析了对锅炉负荷影响、施工工艺和效果评估。
概要介绍某电厂排烟余热利用改造的系统设计方案,分析了确定换热面积和加热器阻力对增压风机的影响等具体技术问题的处理和经济技术指标,该系统可以降低锅炉的排烟温度,并且对余热加以利用.该电厂在脱硫塔进口安装受热面从经济性角度考虑,经济效益可观,对同类型供热电厂也有参考价值。
This paper presents a fully parallelized and scalable RNS Montgomery multiplier over binary field.By generalizing the RNS Montgomery Multiplication (RNS MM) and pseudo-Mersenne-like numbers, we are ab
2006年Prouff等人提出了基于傅立叶谱变换技术的抗DPA攻击的S盒实现方案.此后2008和2009年Coron和Yang Li等人分别对其方案进行改进,但改进后的方案算法仍然较复杂,不便于硬件实现.本文针对硬件电路的特点,对原方案进行分析优化,并提出了一种高效可行的硬件实现方案.更进一步的引入了walsh谱变换技术,克服了原方案在硬件实现过程中可能存在的安全漏洞.文章最后给出了实际实现的电路
内部模板攻击主要利用密码运行过程中处理不同密钥片段的旁路泄露进行密钥分析,克服了传统模板攻击需要获取模板密码设备的条件限制,相关研究是近年来国内外旁路攻击的热点.本文对内部模板攻击进行了三点改进:一是在数据预处理方面,对数据对齐、数据切割、特征检测方法进行了改进,消除了模板建立过程中的数据干扰;二是在模板匹配分析方面,提出了一种基于等级相关性的模板匹配策略,利用功耗曲线电压值的相对排名,提高了单个
SMS4 is the first official released commercial cryptographic algorithm.It provides unified standards for designing and using local area wireless network product.The general DPA attack is not suitable
Algebraic side-channel attack (ASCA) has to rely on a machine solver to solve the equations of the cipher and side channel leaks.Many existing ASCAs utilize the SAT-based solver or the optimizer-based
报告从评估者的角度关注智能卡芯片的侧信道安全问题.首先,分析和总结了芯片安全测评过程中发现的与侧信道和差错注入穿透性分析相关的问题,主要分析对象包括DES、RSA以及SM2等算法构造过程中常用的防护措施,并指出这些措施由于使用不当或缺乏细致的考虑而仍可能遭受攻击.其次,报告简要介绍了芯片密码算法侧信道安全性评估的方法.
The extensive set of physical attack techniques implies to a clear threat to devices that execute cryptography.A fault attack actively influences exe cution and hopes to retrieve information from unin
通过对侵入式分析路径的研究,并结合芯片的物理设计架构,对敏感信号进行寻找和探测,通过对环境的筹备、探测工具的尝试以及各项分析资源配置,推导出一种可行的侵入式被动分析方法,并在密码芯片中进行了探测实践,取得一定成效,为更深入的侵入式分析奠定技术通道.