CN106788978B - Argument decomposition threshold mask method - Google Patents
Argument decomposition threshold mask method Download PDFInfo
- Publication number
- CN106788978B CN106788978B CN201611265089.XA CN201611265089A CN106788978B CN 106788978 B CN106788978 B CN 106788978B CN 201611265089 A CN201611265089 A CN 201611265089A CN 106788978 B CN106788978 B CN 106788978B
- Authority
- CN
- China
- Prior art keywords
- inv
- multiplication
- result
- mask
- domain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 26
- 238000000354 decomposition reaction Methods 0.000 title claims abstract description 8
- 238000013507 mapping Methods 0.000 claims description 13
- 230000000873 masking effect Effects 0.000 claims description 7
- 238000004364 calculation method Methods 0.000 description 4
- 230000014509 gene expression Effects 0.000 description 3
- 239000000969 carrier Substances 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/003—Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
Abstract
Description
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611265089.XA CN106788978B (en) | 2016-12-30 | 2016-12-30 | Argument decomposition threshold mask method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611265089.XA CN106788978B (en) | 2016-12-30 | 2016-12-30 | Argument decomposition threshold mask method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106788978A CN106788978A (en) | 2017-05-31 |
CN106788978B true CN106788978B (en) | 2020-04-21 |
Family
ID=58952219
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611265089.XA Active CN106788978B (en) | 2016-12-30 | 2016-12-30 | Argument decomposition threshold mask method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106788978B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108718230B (en) * | 2018-06-01 | 2021-08-03 | 桂林电子科技大学 | Novel method for realizing password S box without random number threshold |
CN113794549B (en) * | 2021-09-15 | 2023-07-28 | 桂林电子科技大学 | 4-bit password S-box automatic threshold masking method |
CN114553408B (en) * | 2022-02-21 | 2023-11-03 | 上海交通大学 | Galois ring-based threshold linear encryption and decryption method for RS code |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101938349A (en) * | 2010-10-01 | 2011-01-05 | 北京航空航天大学 | S box applicable to hardware realization and circuit realization method thereof |
CN102006161A (en) * | 2010-12-02 | 2011-04-06 | 北京航空航天大学 | Nonlinear transformation method for symmetric key encryption and implementation method thereof |
CN103888247A (en) * | 2014-03-10 | 2014-06-25 | 深圳华视微电子有限公司 | Data processing system resistant to differential power attack analysis and data processing method thereof |
EP2928111A1 (en) * | 2014-03-31 | 2015-10-07 | STMicroelectronics Srl | Method for performing an encryption with look-up tables, and corresponding encryption apparatus and computer program product |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8958550B2 (en) * | 2011-09-13 | 2015-02-17 | Combined Conditional Access Development & Support. LLC (CCAD) | Encryption operation with real data rounds, dummy data rounds, and delay periods |
-
2016
- 2016-12-30 CN CN201611265089.XA patent/CN106788978B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101938349A (en) * | 2010-10-01 | 2011-01-05 | 北京航空航天大学 | S box applicable to hardware realization and circuit realization method thereof |
CN102006161A (en) * | 2010-12-02 | 2011-04-06 | 北京航空航天大学 | Nonlinear transformation method for symmetric key encryption and implementation method thereof |
CN103888247A (en) * | 2014-03-10 | 2014-06-25 | 深圳华视微电子有限公司 | Data processing system resistant to differential power attack analysis and data processing method thereof |
EP2928111A1 (en) * | 2014-03-31 | 2015-10-07 | STMicroelectronics Srl | Method for performing an encryption with look-up tables, and corresponding encryption apparatus and computer program product |
Non-Patent Citations (2)
Title |
---|
基于复合域的SM4算法的设计与实现;梁浩等;《微电子学与计算机》;20150505;全文 * |
抗旁道攻击的对称密码算法及其硬件实现;赵佳;《中国优秀硕士论文电子期刊网》;20130415;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN106788978A (en) | 2017-05-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8638944B2 (en) | Security countermeasures for power analysis attacks | |
AU2005263805B2 (en) | Method and device for carrying out a cryptographic calculation | |
CN113940028B (en) | Method and device for realizing white box password | |
US9794062B2 (en) | Scrambled tweak mode of blockciphers for differential power analysis resistant encryption | |
RU2586020C2 (en) | Method of using countermeasures against attacks by third-party channels | |
US20150222421A1 (en) | Countermeasures against side-channel attacks on cryptographic algorithms | |
Chen et al. | High performance data encryption with AES implementation on FPGA | |
JP6877889B2 (en) | Cryptographic device, encryption method, decryption device, and decryption method | |
CN106788978B (en) | Argument decomposition threshold mask method | |
JP2020510879A (en) | Elliptic curve point multiplication device and method | |
EP3667647A1 (en) | Encryption device, encryption method, decryption device, and decryption method | |
KR20050076015A (en) | Finite field multiplier | |
Oukili et al. | Hardware implementation of AES algorithm with logic S-box | |
CN106936822B (en) | Mask implementation method and system for resisting high-order bypass analysis aiming at SMS4 | |
Shende et al. | FPGA based hardware implementation of hybrid cryptographic algorithm for encryption and decryption | |
US10075290B2 (en) | Operator lifting in cryptographic algorithm | |
Yang et al. | An improved AES encryption algorithm based on chaos theory in wireless communication networks | |
CN109302278B (en) | Mask method and mask circuit for resisting energy analysis attack | |
CN111602367B (en) | Method for protecting entropy sources used in countermeasures for securing white-box cryptographic algorithms | |
Benhadjyoussef et al. | Power-based side-channel analysis against aes implementations: Evaluation and comparison | |
Zhou et al. | An improved AES masking method smartcard implementation for resisting DPA attacks | |
Atha | Design & Implementation of AES Algorithm Over FPGA Using VHDL | |
Serpa et al. | A Secure White Box Implementation of AES Against First Order DCA | |
Jammula | Comparative Study on DES and Triple DES Algorithms and Proposal of a New Algorithm Named Ternary DES for Digital Payments | |
Krishnan et al. | Modified AES with random S-box generation to overcome the side channel assaults using cloud |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
EE01 | Entry into force of recordation of patent licensing contract | ||
EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20170531 Assignee: Guangxi Sujian Technology Co.,Ltd. Assignor: GUILIN University OF ELECTRONIC TECHNOLOGY Contract record no.: X2023980046272 Denomination of invention: Argument Decomposition Threshold Mask Method Granted publication date: 20200421 License type: Common License Record date: 20231108 Application publication date: 20170531 Assignee: Guangxi Guilin Yunchen Technology Co.,Ltd. Assignor: GUILIN University OF ELECTRONIC TECHNOLOGY Contract record no.: X2023980045796 Denomination of invention: Argument Decomposition Threshold Mask Method Granted publication date: 20200421 License type: Common License Record date: 20231108 |