Skip to main content

Design of a S-box for SMS4 Based on Threshold Implementation

  • Conference paper
  • First Online:
Advances on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC 2017)

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 13))

  • 1378 Accesses

Abstract

TI(threshold implementation) is a new masking method that is based on secret sharing and multi-party computation, which can resist the first-order DPA attacks provably and effectively. In this paper, we propose a new S-box scheme on SMS4 which is based on TI. The new S-box scheme uses a secret sharing method to group the input and output of S-box, which can effectively improve the safety of S-box, next, in order to reduce the computational difficulty, converting input to composite field inside the S-box. After analysis and verification, the new S-box scheme can effectively resist first-order DPA attack, and has lower power consumption and less realized area.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Diffie, W., Ledin, G.: SMS4 Encryption Algorithm for Wireless Networks. Iacr Cryptology Eprint Archive (2008)

    Google Scholar 

  2. Nikova, S., Rechberger, C., Rijmen, V.: Threshold implementations against side-channel attacks and glitches. In: International Conference on Information and Communications Security, pp. 529–545. Springer (2006)

    Google Scholar 

  3. Moradi, A., et al.: Pushing the limits: a very compact and a threshold implementation of AES. In: Advances in Cryptology – EUROCRYPT 2011, pp. 69–88. Springer, Berlin (2011)

    Google Scholar 

  4. Bilgin, B., et al.: Efficient and First-Order DPA Resistant Implementations of Keccak (2013)

    Google Scholar 

  5. Bilgin, B., et al.: A more efficient AES threshold implementation. In: International Conference on Cryptology in Africa, pp. 267–284. Springer International Publishing (2014)

    Google Scholar 

  6. Liu, F., et al.: Analysis of the SMS4 block cipher. In: Information Security and Privacy, Australasian Conference, ACISP 2007, Townsville, Australia, July 2–4, 2007, Proceedings DBLP, pp. 158–170 (2007)

    Google Scholar 

  7. Bai, X., Guo, L., Li, T.: Differential power analysis attack on SMS4 block cipher. In: IEEE International Conference on Circuits and Systems for Communications, pp. 613–617. IEEE (2008)

    Google Scholar 

  8. Liang, H., et al.: Design of a masked S-Box for SM4 based on composite field. In: Tenth International Conference on Computational Intelligence and Security, pp. 387–391. IEEE (2015)

    Google Scholar 

  9. Achleitner, S.: Differential Power-Analysis Attacks. VDM Verlag Dr. Müller, Saarbrücken (2008)

    Google Scholar 

  10. Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis, vol. 1666, pp. 388–397 (2011)

    Google Scholar 

  11. Blömer, Johannes: How to share a secret. Commun. ACM 22(22), 612–613 (1979)

    MATH  MathSciNet  Google Scholar 

  12. Nikova, S., Rijmen, V., Ffer, M.: Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches. Springer-Verlag New York, Inc. (2011)

    Google Scholar 

  13. Bilgin, B., et al.: Threshold implementations of small S-boxes. Crypt. Commun. 7(1), 3–33 (2015)

    Article  MATH  MathSciNet  Google Scholar 

  14. Bilgin, B., et al.: Higher-order threshold implementations. In: Advances in Cryptology – ASIACRYPT 2014, pp. 326–343. Springer, Berlin (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xinchao Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, X., Ma, S. (2018). Design of a S-box for SMS4 Based on Threshold Implementation. In: Xhafa, F., Caballé, S., Barolli, L. (eds) Advances on P2P, Parallel, Grid, Cloud and Internet Computing. 3PGCIC 2017. Lecture Notes on Data Engineering and Communications Technologies, vol 13. Springer, Cham. https://doi.org/10.1007/978-3-319-69835-9_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69835-9_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69834-2

  • Online ISBN: 978-3-319-69835-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics