2011
DOI: 10.4218/etrij.11.1510.0112
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Masked Implementation for SEED Based on Combined Masking

Abstract: This paper proposes an efficient masking method for the block cipher SEED that is standardized in Korea. The nonlinear parts of SEED consist of two S-boxes and modular additions. However, the masked version of these nonlinear parts requires excessive RAM usage and a large number of operations. Protecting SEED by the general masking method requires 512 bytes of RAM corresponding to masked S-boxes and a large number of operations corresponding to the masked addition. This paper proposes a new-style masked S-box … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 14 publications
(29 reference statements)
0
2
0
Order By: Relevance
“…However, other countermeasures are required because block cipher SEED is constructed with AND and Addition operations. A few countermeasures to protect the AND operation are suggested in [2]. Moreover, many suggestions [24][25][26][27][28][29][30][31][32] have been proposed with respect to the Addition operation.…”
Section: Countermeasure For Block Cipher Seedmentioning
confidence: 99%
See 1 more Smart Citation
“…However, other countermeasures are required because block cipher SEED is constructed with AND and Addition operations. A few countermeasures to protect the AND operation are suggested in [2]. Moreover, many suggestions [24][25][26][27][28][29][30][31][32] have been proposed with respect to the Addition operation.…”
Section: Countermeasure For Block Cipher Seedmentioning
confidence: 99%
“…For personal identification number transaction security, physical and logical security requirements are required simultaneously for full payment security. To satisfy physical security requirements, some countermeasures [1][2][3][4][5][6][7][8][9][10][11][12][13] against side channel analysis [14][15][16][17][18][19] (This article is an extended version of the paper [19] accepted in Information Security and Cryptology (ICISC) 2017). The security of the financial IC card protocol will also be evaluated after expanding upon a previous suggestion.)…”
Section: Introductionmentioning
confidence: 99%