Abstract
TI(threshold implementation) is a new masking method that is based on secret sharing and multi-party computation, which can resist the first-order DPA attacks provably and effectively. In this paper, we propose a new S-box scheme on SMS4 which is based on TI. The new S-box scheme uses a secret sharing method to group the input and output of S-box, which can effectively improve the safety of S-box, next, in order to reduce the computational difficulty, converting input to composite field inside the S-box. After analysis and verification, the new S-box scheme can effectively resist first-order DPA attack, and has lower power consumption and less realized area.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Diffie, W., Ledin, G.: SMS4 Encryption Algorithm for Wireless Networks. Iacr Cryptology Eprint Archive (2008)
Nikova, S., Rechberger, C., Rijmen, V.: Threshold implementations against side-channel attacks and glitches. In: International Conference on Information and Communications Security, pp. 529–545. Springer (2006)
Moradi, A., et al.: Pushing the limits: a very compact and a threshold implementation of AES. In: Advances in Cryptology – EUROCRYPT 2011, pp. 69–88. Springer, Berlin (2011)
Bilgin, B., et al.: Efficient and First-Order DPA Resistant Implementations of Keccak (2013)
Bilgin, B., et al.: A more efficient AES threshold implementation. In: International Conference on Cryptology in Africa, pp. 267–284. Springer International Publishing (2014)
Liu, F., et al.: Analysis of the SMS4 block cipher. In: Information Security and Privacy, Australasian Conference, ACISP 2007, Townsville, Australia, July 2–4, 2007, Proceedings DBLP, pp. 158–170 (2007)
Bai, X., Guo, L., Li, T.: Differential power analysis attack on SMS4 block cipher. In: IEEE International Conference on Circuits and Systems for Communications, pp. 613–617. IEEE (2008)
Liang, H., et al.: Design of a masked S-Box for SM4 based on composite field. In: Tenth International Conference on Computational Intelligence and Security, pp. 387–391. IEEE (2015)
Achleitner, S.: Differential Power-Analysis Attacks. VDM Verlag Dr. Müller, Saarbrücken (2008)
Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis, vol. 1666, pp. 388–397 (2011)
Blömer, Johannes: How to share a secret. Commun. ACM 22(22), 612–613 (1979)
Nikova, S., Rijmen, V., Ffer, M.: Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches. Springer-Verlag New York, Inc. (2011)
Bilgin, B., et al.: Threshold implementations of small S-boxes. Crypt. Commun. 7(1), 3–33 (2015)
Bilgin, B., et al.: Higher-order threshold implementations. In: Advances in Cryptology – ASIACRYPT 2014, pp. 326–343. Springer, Berlin (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Li, X., Ma, S. (2018). Design of a S-box for SMS4 Based on Threshold Implementation. In: Xhafa, F., Caballé, S., Barolli, L. (eds) Advances on P2P, Parallel, Grid, Cloud and Internet Computing. 3PGCIC 2017. Lecture Notes on Data Engineering and Communications Technologies, vol 13. Springer, Cham. https://doi.org/10.1007/978-3-319-69835-9_19
Download citation
DOI: https://doi.org/10.1007/978-3-319-69835-9_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-69834-2
Online ISBN: 978-3-319-69835-9
eBook Packages: EngineeringEngineering (R0)