期刊文献+

SM4算法S盒输入的相关性能量攻击的研究 被引量:7

RESEARCH ON CORRELATION POWER ATTACK ON SBOX-INPUT OF SM4 ALGORITHM
在线阅读 下载PDF
导出
摘要 在对SM4算法非线性S盒运算输出进行侧信道能量攻击的基础上,针对SM4算法中线性S盒输入提出相关性能量攻击分析的方法。该方法结合相关性能量攻击原理,利用汉明距离能量泄露模型进行攻击,该模型能够更准确刻画假设能量消耗与实测能量消耗之间的关系。在利用此方法获取前四轮或末四轮轮密钥的基础上,推算出128 bit的原始加密密钥。实际攻击结果表明,通过攻击出前四轮轮密钥后,可以成功地推出原始加密密钥。该攻击方法对SM4算法S盒输入有效可行,同时也扩展了对SM4算法的侧信道能量攻击方法。 On the basis of side channel power attack against the nonlinear sbox operation output of SM4 algorithm,in this paper we propose the method of correlation power attack analysis aiming at linear sbox input of SM4 algorithm. Combining the theory of correlation power attack,the method makes use of power leakage model of Hamming distance to conduct the attack,which can more accurately describe the relationship between the assumed power consumption and the measured power consumption. Through this attack,the round keys of the first or the last four rounds of SM4 can be obtained,and based on that the 128 bit original encryption key is derived. The results of actual attack also show that the original encryption key can be successfully calculated by attacking the keys of the first four rounds. The attack method is effective and feasible on sbox-input of SM4,and meanwhile also expands the methods of side channel power attack against SM4 algorithm.
出处 《计算机应用与软件》 CSCD 2015年第12期290-293,333,共5页 Computer Applications and Software
基金 "十二五"国家密码发展基金资助项目(MMJJ201101022) 四川省科技支撑计划项目(2011GZ0170) 四川省教育厅重点科研基金资助项目(13ZA0091) 成都信息工程学院科研基金项目(CRF201301)
关键词 相关性能量攻击 汉明距离模型 SM4算法 Correlation power attacks Hamming distance model SM4 algorithm
  • 相关文献

参考文献11

二级参考文献92

  • 1郑秀林,李敏.SMS4算法的一种改进[J].北京电子科技学院学报,2007,15(4):16-18. 被引量:4
  • 2张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602. 被引量:68
  • 3J.Kelsey,B.Schneier,D.Wagner,et al."Side Channel Cryptanalysis of Product Ciphers".0Proceedings of ESORICS'98,Springer-Verlag,pp.97-110,1998.
  • 4Paul Kocher,Joshua Jaffe,and Benjamin Jun," Differential Power Analysis" in proceedings of Advances in Cryptology-CRYPTO 99,Springer-Verlag,pp.388-397,1999.
  • 5国家商用密码管理办公室.无线局域网产品使用的SMS4密码算法.北京,2006.
  • 6Thomas S.Messerges," Using Second-Order Power Analysis to Attack DPA Resistant to DPA",CHES 2000,pp.238-251,2000.
  • 7YongBin Zhou,DengGuo Feng "Side-Channel Attacks:Ten Years After Its Publication and Impacts on Cryptographic Module Security Testing",the Physical Security Testing Workshop,2005.
  • 8国家商用密码管理办公室.无线局域网产品使用的SMS4密码算法[EB/OL].http//:www.oscca.gov.en/up-File 200621016423197990.pdf,2006.
  • 9Koblitz N.Elliptic curve crytosystems[J].Mathematics of Computation, 1987,48 : 203-209.
  • 10Miller V.Uses of elliptic curves in cryptography[C]//LNCS 218: Advances in Cryptology-Crypto'85,1986:417-426.

共引文献40

同被引文献41

引证文献7

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部