Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Efficient Masked Implementation for SEED Based on Combined Masking

Full metadata record
DC Field Value Language
dc.contributor.authorKim, HeeSeok-
dc.contributor.authorCho, Young In-
dc.contributor.authorChoi, Dooho-
dc.contributor.authorHan, Dong-Guk-
dc.contributor.authorHong, Seokhie-
dc.date.accessioned2021-09-07T13:36:21Z-
dc.date.available2021-09-07T13:36:21Z-
dc.date.created2021-06-14-
dc.date.issued2011-04-
dc.identifier.issn1225-6463-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/112730-
dc.description.abstractThis paper proposes an efficient masking method for the block cipher SEED that is standardized in Korea. The nonlinear parts of SEED consist of two S-boxes and modular additions. However, the masked version of these nonlinear parts requires excessive RAM usage and a large number of operations. Protecting SEED by the general masking method requires 512 bytes of RAM corresponding to masked S-boxes and a large number of operations corresponding to the masked addition. This paper proposes a new-style masked S-box which can reduce the amount of operations of the masking addition process as well as the RAM usage. The proposed masked SEED, equipped with the new-style masked S-box, reduces the RAM requirements to 288 bytes, and it also reduces the processing time by 38% compared with the masked SEED using the general masked S-box. The proposed method also applies to other block ciphers with the same nonlinear operations.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherWILEY-
dc.titleEfficient Masked Implementation for SEED Based on Combined Masking-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, HeeSeok-
dc.contributor.affiliatedAuthorHong, Seokhie-
dc.identifier.doi10.4218/etrij.11.1510.0112-
dc.identifier.scopusid2-s2.0-79954449344-
dc.identifier.wosid000289393900015-
dc.identifier.bibliographicCitationETRI JOURNAL, v.33, no.2, pp.267 - 274-
dc.relation.isPartOfETRI JOURNAL-
dc.citation.titleETRI JOURNAL-
dc.citation.volume33-
dc.citation.number2-
dc.citation.startPage267-
dc.citation.endPage274-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.identifier.kciidART001544567-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.description.journalRegisteredClasskci-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordAuthorSide channel attacks-
dc.subject.keywordAuthorcountermeasure-
dc.subject.keywordAuthormasking method-
dc.subject.keywordAuthorSEED-
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Cyber Security > 1. Journal Articles
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Hong, Seok hie photo

Hong, Seok hie
Department of Information Security
Read more

Altmetrics

Total Views & Downloads

BROWSE