New Second-order Threshold Implementation of Sm4 Block Cipher

被引:0
作者
Shao, Tianyi [1 ,2 ]
Wei, Bohua [2 ,3 ]
Ou, Yu [1 ,2 ]
Wei, Yongzhuang [1 ,2 ]
Wu, Xiaonian [1 ,2 ]
机构
[1] Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Guangxi, Peoples R China
[2] Guilin Univ Elect Technol, Guilin 541004, Guangxi, Peoples R China
[3] Guangxi Wangxin Informat Technol Co Ltd, Nanning 530000, Guangxi, Peoples R China
来源
JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS | 2023年 / 39卷 / 04期
基金
中国国家自然科学基金;
关键词
Block cipher; Side-channel analysis; SM4 block cipher; Threshold implementation; Fresh randomness;
D O I
10.1007/s10836-023-06076-5
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As SM4 block cipher has become an ISO/IEC international encryption standard in June 2020, the security of SM4 against side-channel analysis (SCA) is highly valued by academic community. Threshold implementation (TI) scheme is a common countermeasure against SCA. However, the implementation of a high-order TI scheme can be costly. How to improve the resistance of SM4 implementation against high-order SCA without significant increasing the cost appears to be an important task. In this article, a new SM4 second-order TI scheme is proposed based on the tower field decomposition of 8-bits inverter. In more detail, by performing the tower field decomposition twice in the SM4 S-box, the inverse and multiplication operations on finite field are transformed into inverse and multiplication operations on tower field, thus reducing the algebraic order of the decomposed S-box from 7 to 2. Then, the design and implementation of our scheme with 3 shares is illustrated based on the decomposed S-box. Compared with the best-known TI of the S-box in the SM4, our scheme uses smaller number of register stages. The circuit area of S-box is reduced by 48.6%. The number of fresh randomness required in a single round operation is 96 bits. Moreover, both the second-order t-test with 10 million power traces and the correlation power analysis are performed, thus verifying the second-order security of this scheme.
引用
收藏
页码:435 / 445
页数:11
相关论文
共 28 条
[1]  
Akkar M.-L., 2001, IMPLEMENTATION AES S, P309
[2]  
[Anonymous], 2021, 180333 ISO IEC
[3]  
Bilgin B, 2014, LECT NOTES COMPUT SC, V8874, P326, DOI 10.1007/978-3-662-45608-8_18
[4]   Correlation power analysis with a leakage model [J].
Brier, E ;
Clavier, C ;
Olivier, F .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 :16-29
[5]  
Canright D, 2005, LECT NOTES COMPUT SC, V3659, P441
[6]   Changing of the Guards: A Simple and Efficient Method for Achieving Uniformity in Threshold Sharing [J].
Daemen, Joan .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017, 2017, 10529 :137-153
[7]  
Dhooghe S, 2021, IACR CRYPTOL EPRINT, V734
[8]  
Geng H, 2012, ICCAD-IEEE ACM INT, P163
[9]   Domain-Oriented Masking Compact Masked Hardware Implementations with Arbitrary Protection Order [J].
Gross, Hannes ;
Mangard, Stefan ;
Korak, Thomas .
PROCEEDINGS OF THE 2016 ACM WORKSHOP ON THE THEORY OF IMPLEMENTATION SECURITY (TIS'16), 2016, :3-3
[10]  
He W, 2015, IEEE INT CONF ASAP, P64, DOI 10.1109/ASAP.2015.7245707