LIU Bozhong, GONG Zheng, QIU Weidong, “Automatic Search of Threshold Implementations of 4-Bit S-Boxes Resisting DPA,” Chinese Journal of Electronics, vol. 26, no. 1, pp. 93-100, 2017, doi: 10.1049/cje.2016.10.012
Citation: LIU Bozhong, GONG Zheng, QIU Weidong, “Automatic Search of Threshold Implementations of 4-Bit S-Boxes Resisting DPA,” Chinese Journal of Electronics, vol. 26, no. 1, pp. 93-100, 2017, doi: 10.1049/cje.2016.10.012

Automatic Search of Threshold Implementations of 4-Bit S-Boxes Resisting DPA

doi: 10.1049/cje.2016.10.012
Funds:  This work is supported by New Century Excellent Talents in University of Ministry of Education (No.NCET-12-0358), Technology Innovation Research Program in Shanghai Municipal Education Commission (No.12ZZ019), Supporting Program of the Twelfth Five-year Plan for Sci. and Tech. Research of China (No.2011BAK13B05, No.2014BAK06B00), the National Natural Sciences Foundation of China (No.61572028), the Foundation for Distinguished Young Teachers in Higher Education of Guangdong (No.Yq2013051), the Project of Science and Technology New Star of Guangzhou Pearl River (No.2014J2200006), and the Natural Science Foundation of Guangdong (No.2014A030313439).
  • Received Date: 2014-07-01
  • Rev Recd Date: 2015-02-01
  • Publish Date: 2017-01-10
  • The threshold implementation method of Substitution box (S-box) has been proposed by Nikova et al. for resisting first-order Differential power attacks with glitches. To lower the time complexity for a threshold implementation of a specific non-linear function, one needs to decompose the function first and then search possible share methods for it. However, the time complexity for this search process is still non-trivial. In this paper, an effective method of searching threshold implementations of 4-bit S-boxes is proposed. It mainly consists of two stages. For the decomposing stage, an efficient way of decomposing an S-box is introduced. For the sharing stage, the search complexity is lowered by the technique of time memory trade-off. As a result, threshold implementations of various lightweight block ciphers' S-boxes are given. Moreover, our method is applied to each 4-bit involutive S-box and some candidates of threshold implementations are presented.
  • loading
  • C.D. Cannière, O. Dunkelman and M. Knezevic, "KATAN and KTANTAN-A family of small and efficient hardware-oriented block ciphers", Proc. of International Workshop on Cryptographic Hardware and Embedded Systems, Lausanne, Switzerland, pp.272-288, 2009.
    H. Cheng, H.M. Heys and C. Wang, "Puffin:A novel compact block cipher targeted to embedded digital systems", Proc. of IEEE Symposium on Digital System Design, Parma, Italy, pp.383-390, 2008.
    D. Hong, J. Sung, S. Hong, et al., "HIGHT:A new block cipher suitable for low-resource device", Proc. of International Workshop on Cryptographic Hardware and Embedded Systems, Yokohama, Japan, pp.46-59, 2006.
    K. Shibutani, T. Isobe, H. Hiwatari, et al., "Piccolo:An ultralightweight blockcipher", Proc. of International Workshop on Cryptographic Hardware and Embedded Systems, Nara, Japan, pp.342-357, 2011.
    W.Wu and L.Zhang, "Lblock:A lightweight block cipher", Proc. of International Conference on Applied Cryptography and Network Security, Nerja, Spain, pp.327-344, 2011.
    P.C. Kocher, J. Jaffe and B. Jun, "Differential power analysis", Proc. of CRYPTO, Santa Barbara, California, USA, pp.388-397, 1999.
    J. Blömer, J. Guajardo and V. Krummel, "Provably secure masking of AES", Proc. of Selected Areas in Cryptography, Santa Barbara, CA, USA, pp.69-83, 2004.
    Y. Ishai, A. Sahai and D. Wagner, "Private circuits:Securing hardware against probing attacks", Proc. of International Cryptology Conference on CRYPTO, Santa Barbara, California, USA, pp.463-481, 2003.
    T. Popp and S. Mangard, "Masked dual-rail pre-charge logic:DPAresistance without routing constraints", Proc. of International Workshop on Cryptographic Hardware and Embedded Systems, Edinburgh, UK, pp.172-186, 2005.
    K. Tiri and I. Verbauwhede, "A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation", Proc. of IEEE Conference on Design, Automation and Test in Europe Conference and Exposition, Paris, France, pp.246-251, 2004.
    J.M. Rabaey, "Digital integrated circuits:A design perspective", Prentice-Hall, Inc., Upper Saddle River, 1996.
    W. LI, S. TANG and Z. GONG, "Power analysis attacks against hardware implementation of KLEIN", Journal of Computational Information Systems, Vol.10, No.8, pp.3171-3179, 2014.
    S. Nikova, V. Rijmen and M. Schläffer, "Secure hardware implementation of nonlinear functions in the presence of glitches", Journal of Cryptology, Vol.24, No.2, pp.292-321, 2011.
    B. Bilgin, S. Nikova, V. Nikov, et al., "Threshold implementations of all 3×3 and 4×4 s-boxes", Proc. of International Workshop on Cryptographic Hardware and Embedded Systems, Leuven, Belgium, pp.76-91, 2014.
    A. Moradi, A. Poschmann, S. Ling, et al., "Pushing the limits:A very compact and a threshold implementation of AES", Proc. of International Cryptology Conference on EUROCRYPT, Tallinn, Estonia, pp.69-88, 2011.
    A. Bogdanov, L.R. Knudsen, G. Leander, et al., "Present:An ultra-lightweight block cipher", Proc. of International Workshop on Cryptographic Hardware and Embedded Systems, Vienna, Austria, pp.450-466, 2007.
    A. Poschmann, A. Moradi, K. Khoo, et al., "Side-channel resistant crypto for less than 2,300 GE", Journal of Cryptology, Vol.24, No.2, pp.322-345, 2011.
    Z. Gong, S.I. Nikova and Y.-W. Law, "KLEIN:A new family of lightweight block ciphers", Proc. of ACM Conference on RFID. Security and Privacy, Amherst, MA, USA, pp.1-18, 2011.
    C.D. Cannière, V. Nikov, S. Nikova, et al., "S-box decompositions for SCA-resisting implementations", Poster session in Proc. of International Workshop on Cryptographic Hardware and Embedded Systems, 2010.
    C. Carlet, "Vectorial boolean functions for cryptography", Boolean Models and Methods in Mathematics, Computer Science, and Engineering, Cambridge University Press., pp.398-469, 2010.
    E. Alemneh, "Sharing nonlinear gates in the presence of glitches", Master thesis, the University of Twente, 2010.
    B. Liu, Z. Gong, W. Qiu, et al., "On the security of 4-bit involutive s-boxes for lightweight designs", Proc. of International Conference on Information Security Practice and Experience, Guangzhou, China, pp.247-256, 2011.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (479) PDF downloads(941) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return