{"title":"Design of RSM scheme against DPA suitable for LBlock algorithm","authors":"Bowei Chen, X. Xia, Shuai Guo, Weidong Zhong","doi":"10.1109/AIID51893.2021.9456473","DOIUrl":null,"url":null,"abstract":"A RSM (rotating S-box masking) scheme suitable for the LBlock algorithm to improve the vulnerability of the algorithm before power attacks in this paper. The scheme takes advantage of the characteristics of the LBlock algorithm itself, inserts the mask when the initial intermediate value is calculated, reduces the connection between the intermediate value and the operation, and ensures that both the nonlinear operation and the linear operation are protected by the mask. It is proved that the proposed scheme can resist first-order DPA (differential power analysis) through security experiments.","PeriodicalId":412698,"journal":{"name":"2021 IEEE International Conference on Artificial Intelligence and Industrial Design (AIID)","volume":"220 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Conference on Artificial Intelligence and Industrial Design (AIID)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AIID51893.2021.9456473","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
A RSM (rotating S-box masking) scheme suitable for the LBlock algorithm to improve the vulnerability of the algorithm before power attacks in this paper. The scheme takes advantage of the characteristics of the LBlock algorithm itself, inserts the mask when the initial intermediate value is calculated, reduces the connection between the intermediate value and the operation, and ensures that both the nonlinear operation and the linear operation are protected by the mask. It is proved that the proposed scheme can resist first-order DPA (differential power analysis) through security experiments.