A Novel Masking Scheme for SM3 Based MAC

被引:1
作者
QU Kaige
WU Liji
WANG An
REN Yanting
ZHANG Xiangmin
机构
[1] Tsinghua National Laboratory for Information Science and Technology(TNList),Tsinghua University
[2] Institute of Microelectronics,Tsinghua University
关键词
SM3; algorithm; masking scheme; hardware implementation; power analysis; boolean and arithmetic masking conversion;
D O I
暂无
中图分类号
TN918.1 [理论];
学科分类号
070104 ;
摘要
The Chinese hash algorithm SM3 is verified to be secure enough,but improper hardware implementation may lead to leakage.A masking scheme for SM3 algorithm is proposed to ensure the security of SM3 based Message Authentication Code(MAC).Our scheme was implemented in hardware,which utilizes hardware oriented secure conversion techniques between boolean and arithmetic masking.Security evaluation based on SAKURA-G FPGA board has been done with 2000 power traces from 2000 random plaintexts with random plaintext masks and random key masks.It has been verified that the masked SM3 hardware implementation shows no intermediate value leakage as expected.Our masked SM3 hardware can resist first-order correlation power attack(CPA) and collision correlation attack.
引用
收藏
页码:11 / 21
页数:11
相关论文
共 13 条
[1]  
SAKURA Hardware Security Project. http://satoh.cs.uec.ac.jp/SAKURA/hardware/SAKURA-G.html . 2014
[2]  
Differential Power Analysis of HMAC Based on SHA-2,and Countermeasures. KIM S,YUNG M,LEE H,et al. Information Security Applications . 2007
[3]  
Handbook of Applied Cryptography. Menezes A,van Oorschot P,Vanstone S. Journal of Women s Health . 1996
[4]  
Collision-Correlation Attack Against a First-Order Masking Scheme for MAC Based on SHA-3. PROUFF E,BETTALE L,DOTTAX E,et al. Constructive Side-Channel Analysis and Secure Design . 2014
[5]  
Improved collision-correlation power analysis on first order protected AES. Clavier C,Feix B,Gagnerot G,et al. Cryptographic Hardware and Embedded Systems-CHES 2011 . 2011
[6]  
Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD. Xiaoyun Wang,Dengguo Feng,Xuejia Lai,et al. Rump Session of Crypto’04 E-print . 2004
[7]  
Techniques for random masking in hardware. Golic,Jovan Dj. IEEE Transactions on Circuits and Systems I: Regular Papers . 2007
[8]  
Correlation power analysis with a leakage model. Eric Brier,Christophe Clavier,Francis Olivier. Cryptographic Hardware and Embedded Systems CHES2004 . 2004
[9]  
On Boolean and arithmetic masking against differential power analysis. Coron J S,Goubin L. Cryptographic Hardware and Embedded Systems-CHES 2000 . 2000
[10]  
Efficient and provably secure methods for switching from arithmetic to boolean masking. Debraize B. Cryptographic Hardware and Embedded Systems-CHES 2012 . 2012