A Comprehensive Protection Implementation of SM4 Algorithm Based on Threshold and Infection Technology

被引:0
|
作者
Jiao Z.-P. [1 ,2 ]
Yao F. [1 ,2 ]
Chen H. [1 ,2 ]
Wang J. [1 ,2 ]
Kuang X.-Y. [3 ]
Huang K.-T. [3 ]
机构
[1] Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences, Beijing
[2] University of Chinese Academy of Sciences, Beijing
[3] Electric Power Research Institute, China Southern Power Grid, Guangdong, Guangzhou
来源
关键词
comprehensive protection; fault attack; infection; side channel attack; SM4; algorithm; threshold implementation;
D O I
10.12263/DZXB.20210223
中图分类号
学科分类号
摘要
Side channel attack and fault attack are great threats to the security of cryptography implementation. In view of this situation, this paper combines the threshold implementation(TI) and multiplicative infection protection idea to construct a comprehensive protection scheme with the ability to resist side channel attack and fault attack. Based on the idea of threshold implementation, the protection against side channel attack is realized. Based on the idea of multiplicative infection, the protection against fault attack is realized. The combination of the two theory makes the comprehensive protection scheme capable of resisting side channel attack and fault attack at the same time. In addition, threshold implementation improves the flaw of multiplicative infection when the random number is 0, and the ability of the protection scheme to resist fault attack is further improved by combining the idea of random permutation. Then, based on the above comprehensive protection theory, this paper constructs a comprehensive protection implementation scheme suitable for SM4 algorithm, and carries out a specific implementation on field programmable gate array(FPGA). Finally, the security of the comprehensive protection scheme is verified through theoretical analysis and security evaluation experiments. © 2022 Chinese Institute of Electronics. All rights reserved.
引用
收藏
页码:1066 / 1074
页数:8
相关论文
共 25 条
  • [1] KOCHER P C., Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems, Advances in Cryptology-CRYPTO'96, pp. 104-113, (1996)
  • [2] MESSERGES T S., Using second-order power analysis to attack DPA resistant software, Cryptographic Hardware and Embedded Systems-CHES 2000, pp. 238-251, (2000)
  • [3] FERRIGNO J, HLAVAC M., When AES blinks: introducing optical side channel, IET Information Security, 2, 3, pp. 94-98, (2008)
  • [4] GENKIN D, SHAMIR A, TROMER E., RSA key extraction via low-bandwidth acoustic cryptanalysis, Advances in Cryptology-CRYPTO 2014, pp. 444-461, (2014)
  • [5] BONEH D, DEMILLO R A, LIPTON R J., On the importance of checking cryptographic protocols for faults, Advances in Cryptology-EUROCRYPT'97, pp. 37-51, (1997)
  • [6] KOCHER P, JAFFE J, JUN B., Differential power analysis, Advances in Cryptology-CRYPTO'99, pp. 388-397, (1999)
  • [7] NIKOVA S, RECHBERGER C, RIJMEN V., Threshold implementations against side-channel attacks and glitches, Information and Communications Security, pp. 529-545, (2006)
  • [8] PIRET G, QUISQUATER J J., A differential fault attack technique against SPN structures, with application to the AES and KHAZAD, Cryptographic Hardware and Embedded Systems-CHES 2003, pp. 77-88, (2003)
  • [9] FENG J Y, CHEN H, LI Y, Et al., A framework for evaluation and analysis on infection countermeasures against fault attacks, IEEE Transactions on Information Forensics and Security, 15, pp. 391-406, (2020)
  • [10] ISHAI Y, PRABHAKARAN M, SAHAI A, Et al., Private circuits II: keeping secrets in tamperable circuits, Advances in Cryptology-EUROCRYPT 2006, pp. 308-327, (2006)