A t-Test Method for Detecting Power Information Leakage of S-Box

被引:0
作者
Yan Y. [1 ]
Zheng Z. [1 ]
Guo P. [1 ]
Zhu C. [1 ]
机构
[1] Cryptograpgic Engineering College, Strategic Support Force Information Engineering University, Zhengzhou
来源
Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology | 2021年 / 41卷 / 05期
关键词
Block cipher; Nonlinearity; Power information leakage; T-test; Transparent order;
D O I
10.15918/j.tbit1001-0645.2020.001
中图分类号
学科分类号
摘要
In order to improve the efficiency of t-test in the leakage detection of Block Cipher power information, a new t-test method was proposed.Firstly, the basic steps of t-test to detect power information leakage were introduced.The nonlinear property of S-box was studied by Walsh spectrum.The concept of transparent order was introduced and its relation with nonlinearity was deduced.And the relationship between the nonlinearity of the output bits of the S-box and the leakage of power information was further established.And then, a method was proposed to determine the order of performing t-test on the output bits of the S-box, so as to the sequential detection carried out according to the nonlinearity of the output bits of the S-box.Finally, the first round S-box of DES encryption algorithm was used as an example for verification.The results show that the proposed method can effectively improve the detection efficiency of power information leakage by t-test. © 2021, Editorial Department of Transaction of Beijing Institute of Technology. All right reserved.
引用
收藏
页码:542 / 547
页数:5
相关论文
共 14 条
[1]  
Schneider TOBIAS, Moradi AMIR, Leakage assessment methodology-a clear roadmap for side-channel evaluations
[2]  
MATHER L, OSWALD E, BANDENBURG J, Et al., Does my device leak lnformation?an a priori statistical power analysis of leakage detection tests, Part I of the International Conference on Advances in Cryptology-asiacrypt, (2013)
[3]  
SCHNEIDER T, MORADI A., Leakage assessment methodology, Cryptographic Hardware and Embedded Systems, (2015)
[4]  
SIEBERT M, ELLENBERGER D., Validation of automatic passenger counting: introducing the t-test-induced equivalence test, Transportation, 4, pp. 1-15, (2019)
[5]  
ZHANG S, ZHONG W., A new type of countermeasure against DPA in multi-sbox of block cipher, Wireless Communications and Mobile Computing, 2018, pp. 1-11, (2018)
[6]  
GAO P, XIE H, ZHANG J, Et al., Quantitative verification of masked arithmetic programs against side-channel attacks, International Conference on Tools and Algorithms for the Construction and Analysis of Systems, pp. 6-11, (2019)
[7]  
YAN Yingjian, WANG Shoucheng, XU Jinhui, Research on parallel processing model of block cipher based on Amdahl's law, Transactions of Beijing Institute of Technology, 38, 9, pp. 101-108, (2018)
[8]  
SIEBERT M, ELLENBERGER D., Leakage assessment methodology, Cryptographic Hardware and Embedded System, (2015)
[9]  
LIU Jiayong, Applied cryptography, (2008)
[10]  
YANG Zhiyao, ZHUO Zepeng, CHONG Jinfeng, Correlation analysis of a class of generalized boolean functions, Journal of Huaibei Normal University (Natural Science Edition), 2, pp. 1-3, (2019)