Unlock instant, AI-driven research and patent intelligence for your innovation.

A mask protection method of zuc sequence cipher algorithm whose round output is an arithmetic mask

A technology of serial cipher and mask, applied in encryption devices with shift register/memory, transmission system, digital transmission system, etc., can solve the problem of not knowing the mask and so on

Active Publication Date: 2018-05-18
国家密码管理局商用密码检测中心
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The mask is generated inside the cryptographic device and is different for each execution, so the attacker cannot learn the mask

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A mask protection method of zuc sequence cipher algorithm whose round output is an arithmetic mask
  • A mask protection method of zuc sequence cipher algorithm whose round output is an arithmetic mask
  • A mask protection method of zuc sequence cipher algorithm whose round output is an arithmetic mask

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0103] The technical solution of the present invention is described in detail below, using the smart card chip as a carrier, the technical solution of the application is used to realize the mask protection function of the ZUC algorithm. Here, the number of rounds of mask selection N=5. The specific steps are as follows, see image 3 :

[0104] (1) For the first 5 rounds of initialization, select 4 32-bit random numbers m 1 、m 2 、m 3 、m 4 , where m 1 =(c 0 ,c 1 ,c 2 ,c 3 ), m 2 =(d 0 , d 1 , d 2 , d 3 );

[0105] (2) Change the R of the first round 1 , R 2 respectively with m 1 、m 2 Add up to get the masked input R 1 +m 1 , R 2 +m 2 ; If R of the rth (r∈{1,…,N-1}) round 1 , R 2 Input, due to the first round of S box output with mask protection as R1 +m 1 , R 2 +m 2 , no need to add mask value;

[0106] (3) For each round of input X in the first N rounds 1 , plus the mask guard transforms into X 1 -m 1 +m 3 ; Input X for each round in the first N...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a ZUC sequence cipher algorithm mask protection method whose round output is an arithmetic mask. The method includes: (1) selecting the number of rounds that need to be masked, initializing the first N rounds, and obtaining masked input through random numbers R1+m1, R2+m2; (2) Add mask protection to the input X1 and X2 of each round in the first N rounds, and then convert the addition operation into an XOR operation through the conversion function g(x, y); (4) Carry out 16 displacement operations, L1 and L2 linear operations; (5) Carry out SL' and SR' operations respectively; (6) For the W output of the F function, convert it into an addition operation through the conversion function h(x, y) Get the correct W output. In the mask protection method designed by the technical scheme of the present application, the mask value of each node is different, and the mask value output by each round of S-boxes is also different, which can resist a combination of Hamming weight and Hamming distance. First-order analysis, in addition, second-order analysis failed to find any exploitable leaks.

Description

technical field [0001] The invention belongs to the technical field of encryption algorithm protection, especially in order to make Zu Chongzhi sequence cipher algorithm (ZUC) resistant to side channel analysis and protect key k, a mask protection method for ZUC algorithm is designed, that is, for the round output as arithmetic Masked ZUC sequence cryptographic algorithm masking protection method; this method randomizes the median value of the algorithm so that there is no dependence between the energy consumption of the device and the median value of the cryptographic algorithm executed. Background technique [0002] With the development of information technology, various cryptographic algorithms are being widely used in economic, military, administrative and other important departments to protect the security of information. In view of the importance of cryptographic algorithms, the analysis and research of cryptographic algorithm software and hardware implementation (cryp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L9/00
Inventor 罗鹏李大为曹伟琼冯秀涛陈华李国友
Owner 国家密码管理局商用密码检测中心