Application method of Hamming distance model on SM4 cryptographic algorithm lateral information channel energy analysis and based on S box input

A technology of Hamming distance and cryptographic algorithm, which is applied in the field of cryptographic computing, and can solve problems affecting the success rate of SM4 cryptographic algorithm analysis, etc.

Active Publication Date: 2013-06-05
国家密码管理局商用密码检测中心
View PDF1 Cites 49 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These methods only use typical analysis points, and cannot fully and effectively analyze the SM4 cryptographic algorithm
In addition, when there...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application method of Hamming distance model on SM4 cryptographic algorithm lateral information channel energy analysis and based on S box input
  • Application method of Hamming distance model on SM4 cryptographic algorithm lateral information channel energy analysis and based on S box input
  • Application method of Hamming distance model on SM4 cryptographic algorithm lateral information channel energy analysis and based on S box input

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The technical solution of the present invention is described in detail below. First, the CPA analysis of the round function of the SM4 encryption algorithm is taken as an example to illustrate the technical solution of the present invention. Image 6 It is the flow chart of CPA analysis. For the encryption operation of the SM4 cipher algorithm, if the encrypted plaintext is known, analyze the first 4 rounds of the cipher algorithm. Assuming that the encryption operation of N groups of plaintexts is performed, the input of the kth group of plaintexts is k ∈ {0,...,N-1}, the round input of round i is i is 0, 1, 2, 3 in turn, and the steps are as follows: (1) collect energy traces, perform encryption operations on each group of plaintext, collect energy consumption information corresponding to the measurement time point, which is the energy trace, and establish a sampling energy consumption matrix W(N×T):

[0061] W ( N ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an application method of a Hamming distance model on SM4 cryptographic algorithm lateral information channel energy analysis and based on S box input. The application method is characterized in that the Hamming distance model is established by selecting an S box or a round function as an attacking point in the process that the SM4 cryptographic algorithm lateral information channel energy analysis is carried out, the input of the S box is used as an initial state v1 of the Hamming distance model, the output of the S box is used as subsequent state v2 of the Hamming distance (HD (v1, v2)) model when the S box is attacked, and the output / input of the round function is used as the subsequent state v2 of the Hamming distance (HD (v1, v2)) model when the round function is attacked. The method can be applied to CPA / DPA lateral information channel energy analysis of the SM4 cryptographic algorithm. Correlation between a correct guess secret key and energy information is improved, and validity and success rate of the analysis are enhanced.

Description

technical field [0001] The invention belongs to the technical field of cryptographic algorithm analysis and detection, and specifically relates to performing side channel energy analysis on a cryptographic module implementing the SM4 cryptographic algorithm in the process of cryptographic algorithm implementation, side channel energy analysis, and cryptographic module detection to obtain protected cryptographic data. The energy analysis method of the key information, that is, the application of the Hamming distance model based on the S-box input to the side channel energy analysis of the SM4 cipher algorithm. Background technique [0002] With the development of information technology, various cryptographic algorithms are being widely used in economic, military, administrative and other important departments to protect the security of information. In view of the importance of cryptographic algorithms, the analysis and research of cryptographic algorithm software and hardware...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06
Inventor 李大为罗鹏冯登国曹伟琼邓开勇
Owner 国家密码管理局商用密码检测中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products