| 注册
首页|期刊导航|密码学报(中英文)|SM4的一阶门限实现优化方法

SM4的一阶门限实现优化方法

姚富 陈华 曹伟琼 王舰 付一方

密码学报(中英文)2025,Vol.12Issue(6):1226-1246,21.
密码学报(中英文)2025,Vol.12Issue(6):1226-1246,21.DOI:10.13868/j.cnki.jcr.000821

SM4的一阶门限实现优化方法

Optimization Method for First-Order Threshold Implementation of SM4

姚富 1陈华 2曹伟琼 2王舰 1付一方1

作者信息

  • 1. 中国科学院软件研究所可信计算与信息保障实验室,北京 100190||中国科学院大学,北京 100049
  • 2. 中国科学院软件研究所可信计算与信息保障实验室,北京 100190
  • 折叠

摘要

Abstract

Existing first-order protected implementations of the SM4 algorithm lacks consideration for glitch attacks and suffers from excessive resource overhead,making them unsuitable for resource constrained or medium-to-high-speed application scenarios.This study proposes a first-order threshold implementation of the SM4 algorithm that resists side-channel attacks under glitch conditions.Specif-ically,the proposed approach targets the SM4 S-box by combining two techniques,namely,leveraging the mathematical properties of specially designed masked component functions and exploiting uncor-related intermediate variables in the circuit as fresh randomness,to construct a first-order threshold multiplication module over GF(24).For the inversion operation over GF(24),the direct masking method is adopted and 16 additional random bits are introduced,which not only ensure uniformity of the output masked shares but also jointly guarantee first-order glitch-resistant security when com-bined with the multiplication module.The SILVER automated evaluation tool is used to verify the first-order glitch resistance of the critical S-box component,a standard TVLA is performed to evaluate information leakage across the entire protected design,and a first-order CPA attack is mounted on an FPGA-based implementation of the proposed scheme.Experimental results show that,even in the presence of glitches,the proposed implementation effectively resists side-channel attacks under 10 million power traces.Moreover,the design exhibits low resource consumption and demonstrates significant advantages in silicon area compared to existing schemes.

关键词

SM4算法/侧信道攻击/门限实现/毛刺探测模型/硬件实现

Key words

SM4 algorithm/side channel attack/threshold implementation/glitch-extended probing model/hardware implementation

分类

信息技术与安全科学

引用本文复制引用

姚富,陈华,曹伟琼,王舰,付一方..SM4的一阶门限实现优化方法[J].密码学报(中英文),2025,12(6):1226-1246,21.

基金项目

国家自然科学基金(62172395)National Natural Science Foundation of China(62172395) (62172395)

密码学报(中英文)

OA北大核心

2095-7025

访问量0
|
下载量0
段落导航相关论文