Securing SMS4 Cipher Against Differential Power Analysis and Its VLSI Implementation

Free registration required

Executive Summary

Differential power analysis is of great concern because it can be used to break implementations of almost any symmetric or asymmetric algorithm, and several countermeasures have been proposed to protect implementations of cryptographic algorithms except SMS4 cipher. In the present paper, the authors focus on the differential power analysis attack on SMS4 cipher, and suggest a secure masking scheme for SMS4 cipher, which is particularly suited for implementation in dedicated hardware. In addition, several methods such as module reuse and changing computing order are employed to reduce circuit area and maintain its speed.

  • Format: PDF
  • Size: 150.9 KB