信息网络安全 ›› 2021, Vol. 21 ›› Issue (7): 80-86.doi: 10.3969/j.issn.1671-1122.2021.07.010

• 技术研究 • 上一篇    下一篇

基于秘密共享的LBlock的S盒防御方案

陈柏沩1,2, 夏璇1, 钟卫东1,2(), 吴立强1   

  1. 1.武警工程大学密码工程学院,西安710086
    2.网络与信息安全武警部队重点实验室,西安 710086
  • 收稿日期:2021-01-12 出版日期:2021-07-10 发布日期:2021-07-23
  • 通讯作者: 钟卫东 E-mail:wdesat@163.com
  • 作者简介:陈柏沩(1997—),男,江苏,硕士研究生,主要研究方向为侧信道攻击与防御|夏璇(1998—),男,湖南,硕士研究生,主要研究方向为侧信道攻击与防御|钟卫东(1970—),男,河北,教授,博士,主要研究方向为信息安全|吴立强(1987—),男,陕西,讲师,硕士,主要研究方向为信息安全
  • 基金资助:
    国家重点研发计划(2017YFB0802000);武警工程大学基础基金(WJY201914)

The Defense Scheme of S-box on LBlock Based on Secret Sharing

CHEN Bowei1,2, XIA Xuan1, ZHONG Weidong1,2(), WU Liqiang1   

  1. 1. College of Cryptographic Engineering, Engineering University of PAP, Xi’an 710086, China
    2. Network and Information Security Key Laboratory of PAP, Xi’an 710086, Chin
  • Received:2021-01-12 Online:2021-07-10 Published:2021-07-23
  • Contact: ZHONG Weidong E-mail:wdesat@163.com

摘要:

针对LBlock算法在侧信道攻击前脆弱的问题,文章提出一种可以抵抗一阶和二阶差分功耗攻击(Differential Power Analysis,DPA)的门限防护方案。该方案以秘密共享原理为基础理论,并且在算法进行运算时采用了复合域的概念,将算法的运算域由GF(24)转移到GF(22)上,减少硬件消耗的同时,又提高了算法的安全性。在乘法器分组中采用虚拟值方法,以保证满足门限方案的均匀性,并在反相器中引入分解法,以保证各信息分组相关独立且线性无关。分析验证表明,方案满足门限方案所需要的各项性质,并且可以抵御一阶、二阶DPA攻击。所有的信息分组都是独立且无联系的,所以该方案对于glitch攻击也具有相应的防护能力,具有较好的实用性。

关键词: 秘密共享, DPA攻击, 防御方案, glitch攻击, S盒

Abstract:

Aiming at the problem that the LBlock algorithm is very fragile before side-channel attacks, the article proposes a threshold protection scheme that can resist first-order and second-order Differential Power Analysis (DPA). This scheme is based on the principle of secret sharing, and adopts the concept of compound domain when the algorithm is operated, and transfers the operation domain of the algorithm from GF(24) to GF(22). While reducing hardware consumption, it also improves the security of the algorithm. The virtual value method is used in the multiplier grouping to ensure the uniformity of the threshold scheme, and the decomposition method is introduced in the inverter to ensure that each information group is independent and linearly independent. Through analysis and verification, the scheme satisfies all the properties required by the threshold scheme and can resist first-order and second-order DPA attacks. Because all information groups are independent and unrelated, the solution also has corresponding protection against glitch attacks and has good practicability.

Key words: secret sharing, DPA attacks, defense scheme, glitch attack, S-box

中图分类号: