|
This article is cited in 2 scientific papers (total in 2 papers)
GOST 28147-89 masking against side channel attacks
S. V. Matveev Technical committee for standardization (TC 26), Moscow
Abstract:
Side-channel attacks exploit leakage from the physical implementation of a cryptographic algorithm to obtain some additional information on its secret parameters. During the last decade we observe the intensive development of various side-channel attacks, that affect security of many popular cryptosystems. In an attempt to reduce the possible damage a general method that masks the intermediate data was proposed. This method was studied for popular cryptographic algorithms such as RSA, DES, AES and several of the AES candidates. In this paper we propose a strategy of masking for Russian cryptographic standard GOST 28147-89 and perform an analysis of its properties.
Key words:
GOST 28147-89, side-channel attack.
Received 16.IX.2014
Citation:
S. V. Matveev, “GOST 28147-89 masking against side channel attacks”, Mat. Vopr. Kriptogr., 6:2 (2015), 35–43
Linking options:
https://www.mathnet.ru/eng/mvk143https://doi.org/10.4213/mvk143 https://www.mathnet.ru/eng/mvk/v6/i2/p35
|
Statistics & downloads: |
Abstract page: | 725 | Full-text PDF : | 501 | References: | 78 | First page: | 11 |
|