Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A mask protection method and system against arbitrary order side channel attacks

A side-channel attack and masking technology, applied in the field of arbitrary-order masking schemes and systems, can solve the problem that high-order masking schemes are difficult to apply, high-order masks increase overhead, and first-order masking schemes cannot meet security requirements. And other issues

Active Publication Date: 2019-04-12
WUHAN UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these countermeasures can only resist the first-order SCA attack. The first-order masking scheme can no longer meet the security requirements, and the higher-order masking scheme is gradually developed.
While pursuing higher security, the high-order masking scheme is also constantly developing towards generalization, mainly in the design of a generalized S-box masking scheme to ensure that it can be applied to any S-box design and can resist any order of SCA attack, but high-order masking will greatly increase additional overhead, so it is difficult to apply high-order masking schemes on resource-constrained devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A mask protection method and system against arbitrary order side channel attacks
  • A mask protection method and system against arbitrary order side channel attacks
  • A mask protection method and system against arbitrary order side channel attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0089] The technical scheme of the present invention is described below in conjunction with accompanying drawing and embodiment

[0090] The embodiments of the present invention reconstruct and generate a lookup table to replace the non-linear components in the original encryption algorithm, thereby realizing encryption.

[0091] The non-linear part S (x) of described encryption algorithm can be defined as

[0092] S:{0,1} k →{0,1} k '

[0093] Among them, the input width is k, the output width is k’, the original input is x, and the original output is y. For the safe masking method, x is required to be split into n independent shared factors, which are recorded as x 1 ,x 2 ,...,x n , and satisfy split y into y 1 ,y 2 ,...,y n , and satisfy

[0094] The refactored lookup table contains two 2 k dimensional column vectors L and R and an n'×2 k The random number matrix M, where Let this list be {L, M, R}. M(u)[j] represents the jth element of the row vector M(u)...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mask protection method and system capable of resisting arbitrary-order side channel attacks. A look-up table is generated by reconstruction to replace a nonlinear component; in the look-up table {L, M, R}, elements of a vector L are exclusive-or values of an output of the nonlinear component and n-1 random numbers; the random numbers are stored in a matrix M; a vector R is used for storing an address of a second query; the table satisfies inputting of x<1>, x<2>,..., x<n> and outputting of independent random y<1>, y<2>,..., y<n>, and meanwhile any information of an original input x and an original output y is not leaked; and a table query process comprises the following steps: firstly, generating the look-up table {L, M, R}; then, reconstructing the table through the x<1>, x<2>,..., x<n-1> firstly; performing table refreshing once between every two table reconstructions; and lastly, querying the table {L, M, R} through the x<n> to obtain the y<1>, y<2>,..., y<n>. Through the scheme, the arbitrary-order side channel attacks can be effectively resisted. The method and the system have the characteristics of high security, high practicability and high extensibility.

Description

technical field [0001] The invention relates to the technical field of cryptographic security, in particular to an arbitrary-order masking scheme and system for different software and hardware carriers, which can effectively resist arbitrary-order side channel attacks. Background technique [0002] The carrier form of cryptographic chips or encryption devices has been subjected to various types of analysis and attacks, especially Side Channel Attack (SCA) targeting hardware circuits, which has become the main threat to the hardware form of cryptographic algorithms. The so-called side channel attack refers to the use of various side channels in the circuit working process to leak information, such as: energy consumption, time, faults, electromagnetic radiation, etc. keys) to realize the extraction of secret information. [0003] The mask confrontation scheme is a widely used side channel countermeasure method. Since the mask confrontation scheme was proposed [7], it has grad...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L29/06
CPCH04L9/002H04L63/1441
Inventor 唐明邱镇龙郭志鹏
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products