Application of selecting round key XOR input to perform side-channel power analysis of SM4 cryptographic algorithm

A cryptographic algorithm and energy analysis technology, which is applied in the application field of selecting round key XOR input for SM4 cryptographic algorithm side channel energy analysis, and can solve the problems affecting the success rate of SM4 cryptographic algorithm analysis.

Active Publication Date: 2013-07-31
国家密码管理局商用密码检测中心
View PDF0 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These methods only use typical analysis points, and cannot fully and effectively analyze the SM4 cryptographic algorithm
In addition, when there is

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application of selecting round key XOR input to perform side-channel power analysis of SM4 cryptographic algorithm
  • Application of selecting round key XOR input to perform side-channel power analysis of SM4 cryptographic algorithm
  • Application of selecting round key XOR input to perform side-channel power analysis of SM4 cryptographic algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] The technical solution of the present invention is described in detail below. First, the CPA analysis of the round function of the SM4 encryption algorithm is taken as an example to illustrate the technical solution of the present invention. Image 6 Is the CPA analysis flow chart,. For the encryption operation of the SM4 cipher algorithm, if the encrypted plaintext is known, analyze the first 4 rounds of the cipher algorithm. Assuming that the encryption operation of N groups of plaintexts is performed, the input of the kth group of plaintexts is k ∈ {0,...,N-1}, the round input of round i is i is 0, 1, 2, 3 in turn, and the steps are as follows: (1) collect energy traces, perform encryption operations on each group of plaintext, collect energy consumption information corresponding to the measurement time point, which is the energy trace, and establish a sampling energy consumption matrix W(N×T):

[0065]

[0066] in, Expressed as the sampling energy consumpt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an application of selecting round key XOR input to perform side-channel power analysis of an SM4 cryptographic algorithm. The application is characterized in that in the process of the side-channel power analysis of the SM4 cryptographic algorithm, S boxes or round functions are selected to serve as attack points to establish a Hamming distance (HD) model, the round key XOR input is taken as a preceding state v1 of the HD model, and when the S boxes are attacked, the subsequent state v2 of the HD (v1, v2) model is S box output; and when the round functions are attacked, the subsequent state v2 of the HD (v1, v2) model is output/input of the round functions. The method can be applied to the side-channel power analysis of a CPA (correlation power analysis) and DPA (differential power analysis) of the SM4 cryptographic algorithm. With the adoption of the method, the correlation between a right guessing secret key and a power message is improved, the effectiveness of the analysis is enhanced, and the success rate is increased.

Description

technical field [0001] The invention belongs to the technical field of cryptographic algorithm analysis and detection, and specifically relates to performing side channel energy analysis on a cryptographic module implementing the SM4 cryptographic algorithm in the process of cryptographic algorithm implementation, side channel energy analysis, and cryptographic module detection to obtain protected cryptographic data. The energy analysis method of the key information, that is, the application of the side channel energy analysis of the SM4 cipher algorithm by selecting the XOR input of the round key. Background technique [0002] With the development of information technology, various cryptographic algorithms are being widely used in economic, military, administrative and other important departments to protect the security of information. In view of the importance of cryptographic algorithms, the analysis and research of cryptographic algorithm software and hardware implementa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06
Inventor 罗鹏冯登国李大为曹伟琼侯北萍
Owner 国家密码管理局商用密码检测中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products