Efficient Masked Implementation for SEED Based on Combined Masking
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, HeeSeok | - |
dc.contributor.author | Cho, Young In | - |
dc.contributor.author | Choi, Dooho | - |
dc.contributor.author | Han, Dong-Guk | - |
dc.contributor.author | Hong, Seokhie | - |
dc.date.accessioned | 2021-09-07T13:36:21Z | - |
dc.date.available | 2021-09-07T13:36:21Z | - |
dc.date.created | 2021-06-14 | - |
dc.date.issued | 2011-04 | - |
dc.identifier.issn | 1225-6463 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/112730 | - |
dc.description.abstract | This paper proposes an efficient masking method for the block cipher SEED that is standardized in Korea. The nonlinear parts of SEED consist of two S-boxes and modular additions. However, the masked version of these nonlinear parts requires excessive RAM usage and a large number of operations. Protecting SEED by the general masking method requires 512 bytes of RAM corresponding to masked S-boxes and a large number of operations corresponding to the masked addition. This paper proposes a new-style masked S-box which can reduce the amount of operations of the masking addition process as well as the RAM usage. The proposed masked SEED, equipped with the new-style masked S-box, reduces the RAM requirements to 288 bytes, and it also reduces the processing time by 38% compared with the masked SEED using the general masked S-box. The proposed method also applies to other block ciphers with the same nonlinear operations. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | WILEY | - |
dc.title | Efficient Masked Implementation for SEED Based on Combined Masking | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, HeeSeok | - |
dc.contributor.affiliatedAuthor | Hong, Seokhie | - |
dc.identifier.doi | 10.4218/etrij.11.1510.0112 | - |
dc.identifier.scopusid | 2-s2.0-79954449344 | - |
dc.identifier.wosid | 000289393900015 | - |
dc.identifier.bibliographicCitation | ETRI JOURNAL, v.33, no.2, pp.267 - 274 | - |
dc.relation.isPartOf | ETRI JOURNAL | - |
dc.citation.title | ETRI JOURNAL | - |
dc.citation.volume | 33 | - |
dc.citation.number | 2 | - |
dc.citation.startPage | 267 | - |
dc.citation.endPage | 274 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.identifier.kciid | ART001544567 | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.description.journalRegisteredClass | kci | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordAuthor | Side channel attacks | - |
dc.subject.keywordAuthor | countermeasure | - |
dc.subject.keywordAuthor | masking method | - |
dc.subject.keywordAuthor | SEED | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
145 Anam-ro, Seongbuk-gu, Seoul, 02841, Korea+82-2-3290-2963
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.