期刊文献+

针对SMS4轮输出的选择明文能量分析攻击 被引量:11

Chosen-plaintext power analysis attack against SMS4 with the round-output as the intermediate data
在线阅读 下载PDF
导出
摘要 提出了针对SMS4轮输出的选择明文能量分析攻击,攻击时以一定约束条件选择明文,先攻击出轮迭代函数的输出,再由轮迭代函数的输出反推出对应的轮子密钥,从而实现了以轮输出作为中间数据对SMS4的能量分析攻击,并利用该方法对无防护SMS4算法的能量曲线进行了能量分析攻击,实验表明该攻击方法是行之有效的。 The method of chosen-plaintext power analysis attack against SMS4 with the round-output as the intermediate data is proposed. Firstly, this method attacks out the output of the iterative function. Then the sub key can be achieved by the output of the iterative function. And it is achieved to make the attack real and improve the efficiency, when SMS4 is attacked by taking of the method. In particular, the actual experiment of the method is done, and the results show that the attack algorithm is correct and effective.
出处 《通信学报》 EI CSCD 北大核心 2015年第1期142-148,共7页 Journal on Communications
基金 国家重大科技专项基金资助项目(2014ZX01032401-001) 国家高技术研究发展计划(863计划)基金资助项目(2012AA01A403) "十二五"国家密码发展基金资助项目(MMJJ201101022) 四川省科技支撑计划项目基金资助项目(2014GZ0148) 四川省教育厅重点科研基金资助项目(13ZA0091) 成都信息工程学院科研基金资助项目(CRF201301)~~
关键词 SMS4算法 能量分析攻击 轮输出 选择明文 SMS4 algorithm power analysis attack round output chosen-plaintext
  • 相关文献

参考文献7

  • 1KOCHER P, JAFFE J, JUN B. Differential power analysis[A]. Pro- ceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology[C]. 1999.388- 397.
  • 2吴震,陈运,陈俊,王敏.真实硬件环境下幂剩余功耗轨迹指数信息提取[J].通信学报,2010,31(2):17-21. 被引量:13
  • 3CHEN A D, XU S, CHEN Y. Collision-based chosen-plaintext simple power clustering attack algorithm[J]. China Communications, 2013,(5) 114-119.
  • 4BRIER E, CLAVIER C, OLIVIER F a leakage module[A]. CHES 2004[C] Correlation power analysis with 2004.125-134.
  • 5国家商用密码管理办公室.无线局域网产品使用的SMS4密码算法[EB/OL].http//:www.oscca.gov.en/up-File 200621016423197990.pdf,2006.
  • 6BAI X F, XU Y H, GUO L. Securing SMS4 cipher against differential power analysis and its VLSI implementation[A]. Proceedings of 1 lth IEEE International Conference on Communication Systems[C]. Guangzhou, China, 2008.167-172.
  • 7赵新杰,王韬,郑媛媛.针对SMS4密码算法的Cache计时攻击[J].通信学报,2010,31(6):89-98. 被引量:12

二级参考文献31

  • 1张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602. 被引量:68
  • 2KOCHER E Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems[A]. Proceedings of Advances in Cryptology-CRYPTO'96[C]. 1996. 104-113.
  • 3DHEM J F, KOEUME F, LEROUX P A, et al. A practical implementation of the timing attack[A]. Proceedings of CARDIS 1998[C]. 1998.14-16.
  • 4MESSERGES T S, DABBISH E A, SLOAN R H. Investigations of power analysis attacks on smart cards[A]. Proc USENIX Workshop Smartcard Technology[C]. Chicago, Illinois ,USA, 1999. 151-161.
  • 5KOCHER P, JAFFE J, JUN B. Differential power analysis[A]. Proceedings of Advances in Cryptology[C]. 1999.388-397.
  • 6ITOH K, IZU T, TAKENAKA M. Address-bit differential power analysis of cryptographic schemes OK-ECDH and OK-ECDSA[A]. CHES 2002[C]. 2003. 129-143.
  • 7ITOH K, IZU T, TAKENAKA M. A Practical Countermeasure against address-bit differential power analysis C D[A]. CHES 2003[C]. 2003.382-396.
  • 8CORSONELLO P. An Integrated Countermeasure against Differential Power Analysis for Secure Smart-Cards[M]. The Circuit is Under Patenting. US Provisional Patent Application 60/643, 165.
  • 9RATANPAL G B, WILLIAMS R D, BLALOCK T N. An on-chip signal suppression countermeasure to power analysis attacks[J]. IEEE Transac tions on Dependable and Secure Computing, 2004, 1(3): 179.
  • 10MESSERGES T S. Securing the AES finalists against power analysis attacks[A]. Proceedings of Fast Software Encryption Workshop 2000[C]. 2000.150-164.

共引文献27

同被引文献52

  • 1崔杰,李陶深,兰红星.基于Hadoop的海量数据存储平台设计与开发[J].计算机研究与发展,2012,49(S1):12-18. 被引量:142
  • 2国家商用密码管理办公室.无线局域网产品使用的SMS4密码算法[EB/OL].http//:www.oscca.gov.en/up-File 200621016423197990.pdf,2006.
  • 3Paul Kocher, Joshua Jaffe, and Benjamin Jun. Differential Power Analysis[C]//Proceedings of the 19th Annual International Cryptology Confer-ence on Advances in Cryptology, 1999.
  • 4KOCHER P C. Timing attacks on implementations of diflfie-hellman, RSA, DSS, and other sys-tems[C]//Berlin: Springer, 1996.
  • 5李浪,李仁发,李静.一种SM4加密算法差分能量攻击[J].北京电子科技学院学报,2008,37(7):39-41.
  • 6Kim T, Kim J, Hong S, et al. Linear and Dif-ferential Cryptanalysis of Reduced SMS4 Block Cipher[C]//IACR Cryptology ePrint At-chive 01/2008; 2008:281.
  • 7Lu J, Kim J, Kelle N, et al. Improving the Efficiency of Impossible Differential Crypta-nalysis of Reduced Camellia and MISTY [C]//ics in Cryptology - CT-RSA 2008. San Francisco, 2008.
  • 8Eric Brier, Christophe Clavier, Francis Olivier. Correlation Power Analysis with a Leakage Mod-el[C]//proceeding of Cryptographic Hard- ware and Embedded Systems-CHES 2004. 2004:16-29.
  • 9PAUL K, JOSHUA J, BENJAMIN J. Differential power analysis[A]. Proceedings of the 19th Annual International Cryptology Conferenee on Advances in Cryptology[C]. 1999. 388- 397.
  • 10ERIC B, CHRISTOPHE C, FRANCIS O. Correlation power analysis with a leakage model[A]. Proceeding of 6th International Workshop Cambridge[C]. M_A, USA, 2004.16-29.

引证文献11

二级引证文献37

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部