Font Size: a A A

Research On Threshold Implementation Method Of GIFT And RECTANGLE Encryption Algorithms

Posted on:2020-10-15Degree:MasterType:Thesis
Country:ChinaCandidate:H R JiangFull Text:PDF
GTID:2428330599959714Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
Block ciphers play an important role in the field of network and information security because of its advantages such as easy standardization and easy implementation in software or hardware.However,these encryption algorithms are vulnerable to side channel attacks,such as differential power attacks and so on,when implemented in a specific chip module.A lightweight block cipher algorithm emerged with the drive of resource constrained environment application requirements.How to construct a new mask protection method to ensure that the lightweight block cipher algorithm against side channel attacks has become a hot topic in academic community.In this thesis,based on the mathematical characteristics of the S-box,a nonlinear part of lightweight block cipher algorithms GIFT and RECTANGLE,and combined with the threshold implementation method,second-order threshold implementations are proposed.The main results are as follows:1.The second-order threshold implementation method of the lightweight block cipher algorithm GIFT is proposed.Since the present GIFT algorithm protection scheme can only resist first-order power attacks.In order to make the algorithm against high-order power attacks more effective,the second order threshold implementation scheme of GIFT algorithm is constructed by using the mathematical structure of GIFT algorithm and the threshold implementation method.That is to use the mathematical characteristics of the nonlinear component S-box,second-order threshold implementation schemes such as(3,9),(6,7)and(5,10)are constructed respectively.Through the method of hardware resources quantization,the(3,9)scheme with the least required hardware resources is selected and implemented in FPGA platform.In order to compare the chip area occupied by the analysis scheme better,parallel and serial hardware implementation methods are used respectively.The results show that under the NanGate 45 nm Open Library technology library,the total area consumed by parallel implementation is 12043GE(GE is the unit of chip area,namely Gate equivalent,is a kind of independent of the complexity of manufacturing technology of the digital circuit unit of measure,generally a GE equals two input NAND gate of unit area),the total area consumed by serial implementation is 6373 GE.2.Side information leakage detection for the second-order threshold implementation of GIFT algorithm is performed.By collecting the actual power consumption curve,the T-test is used to detect the side information leakage of the second-order threshold implementation scheme of the GIFT algorithm.The results show that the algorithm before the second-order threshold implementation has a large side information leakage,while the algorithm after the implementation of the second order threshold has little side information leakage.The security of the second-order threshold implementation is confirmed.3.The second-order threshold method for RECTANGLE block cipher is proposed.Based on the algebraic normal form of the S-box of the algorithm,the second-order threshold implementation scheme is constructed by using the algebraic normal form direct threshold implementation.The scheme uses four masked input components and eight output expressions.Then the scheme was implemented on FPGA platform,and the hardware implementation method of parallel implementation was used.The test results show that under the NanGate 45 nm Open Library technology library,the total consumption area is 17078.79 GE,and the area consumed by the S-box is 5664.80 GE.
Keywords/Search Tags:Lightweight block cipher algorithm, Power attack, Threshold implementation, Chip area, FPGA
PDF Full Text Request
Related items