Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An Arbitrary Order Mask Protection Method with Variable Complexity

A complex and variable technology, applied in the field of password security, can solve the problems of high-order masking overhead, high-order masking schemes are difficult to apply, and first-order masking schemes cannot meet security requirements, etc., to achieve resource overhead Low-cost, practical, and scalable effects

Active Publication Date: 2019-03-19
WUHAN UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these countermeasures can only resist the first-order SCA attack. The first-order masking scheme can no longer meet the security requirements, and the higher-order masking scheme is gradually developed.
While pursuing higher security, the high-order masking scheme is also constantly developing towards generalization, mainly in the design of a generalized S-box masking scheme to ensure that it can be applied to any S-box design and can resist any order of SCA attack, but high-order masking will greatly increase additional overhead, so it is difficult to apply high-order masking schemes on resource-constrained devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Arbitrary Order Mask Protection Method with Variable Complexity
  • An Arbitrary Order Mask Protection Method with Variable Complexity
  • An Arbitrary Order Mask Protection Method with Variable Complexity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the implementation examples described here are only used to illustrate and explain the present invention, and are not intended to limit this invention.

[0048] The present invention proposes a lightweight arbitrary-order mask protection scheme, which is called a PFD scheme (Polynomial Function Division Scheme), to effectively resist arbitrary-order side channel attacks.

[0049] The embodiments of the present invention reconstruct nonlinear operations to replace nonlinear components in the original encryption algorithm, including logic function splitting algorithms, logic function adjustment algorithms, logic function refresh algorithms and a complete PFD solution.

[0050] The nonlinear component S(x) of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a complexity-variable arbitrary-order mask protection method. The method comprises the following steps: using St and d k-bit input sharing factors x1, x2, ..., xd of k' logic function configuration sequences with length of 2k-bit as the input, obtaining d k-bit output sharing factors y1, y2, ..., yd, wherein St represents the logic function configuration sequence corresponding to the t-th output bit in the S box in an original encryption algorithm, and t is not less than 1 and not more than k', the input sharing factor meets the FORMULA, and the output sharing factor meeting the FORMULA. Through the adoption of the method disclosed by the invention, the resource expenditure is relatively low, and the resource expenditure and the running efficiency can be adjusted according to actual application environment; the arbitrary-order side channel attack can be effectively resisted, the security is high; the method disclosed by the invention is strong in practicability, simple to implement, strong in expandability and can be applied to different software / hardware carriers.

Description

technical field [0001] The invention belongs to the technical field of cryptographic security, and in particular relates to a high-order masking method for different software and hardware carriers, which can effectively resist arbitrary-order side channel attacks. Background technique [0002] The carrier form of cryptographic chips or encryption devices has been subjected to various types of analysis and attacks, especially Side Channel Attack (SCA) targeting hardware circuits, which has become the main threat to the hardware form of cryptographic algorithms. The so-called side channel attack refers to the use of various side channels in the circuit working process to leak information, such as: energy consumption, time, faults, electromagnetic radiation, etc. (such as keys) to realize the extraction of secret information. [0003] The mask confrontation scheme is a widely used side channel countermeasure method. Since the mask confrontation scheme was proposed ([Document 7...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L9/00
CPCH04L9/002H04L9/06
Inventor 唐明郭志鹏李煜光李延斌王蓬勃
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products