Side channel energy analysis method for SM3 cryptographic algorithm HMAC mode

A technology of energy analysis and cryptographic algorithm, applied in the field of side channel energy analysis

Active Publication Date: 2013-12-18
国家密码管理局商用密码检测中心
View PDF2 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0052] 3 hash value
[0054] For the SM3 cryptographic algorithm HMAC mode, there is no relevant specific energy analysis method yet. The present invention combin

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Side channel energy analysis method for SM3 cryptographic algorithm HMAC mode
  • Side channel energy analysis method for SM3 cryptographic algorithm HMAC mode
  • Side channel energy analysis method for SM3 cryptographic algorithm HMAC mode

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0103] The present invention will be further described below in conjunction with embodiment:

[0104] The present invention analyzes K with the CPA method in As an example, CPA analysis K out , DPA analysis K in / K out The implementation mode is consistent with this scheme.

[0105] 1. Collect energy traces

[0106] Input N different messages W=(m 1 ,...,m n ), let each input m 1 The values ​​are different, and the energy traces during the HMAC operation are collected separately, and K is selected in =A 0 B 0 C 0 D. 0 E. 0 f 0 G 0 h 0 Participate in the energy consumption part of the operation to obtain the energy trace matrix E ( N × T ) = e 1 1 . . . ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a side channel energy analysis method for an SM3 cryptographic algorithm HMAC mode. The method performs analyses on implementation characteristics of a SM3 cryptographic algorithm and the HMAC mode of the SM3 cryptographic algorithm. Based on a DPA attack method and a CPA attach method, the SM3 cryptographic algorithm HMAC mode is successfully cracked in combination with the characteristics of the SM3 cryptographic algorithm HMAC mode and energy consumption leakage points, and output summaries can be freely fabricated. According to the technical scheme, the method includes the steps that 1, energy traces of HMACs are collected; 2, a K[in] is obtained through analyses and the K[in] is an intermediate state value in a first hash algorithm; 3, a K[out] is obtained through analyses and the K[out] is an intermediate state value in a second hash algorithm. The method in the step 3 is the same as that in the step 2. According to the technical scheme, the method provides a solution for side channel analysis implementation of the SM3 cryptographic algorithm.

Description

technical field [0001] The invention provides a side channel energy analysis method for the SM3 cipher algorithm HMAC mode, and relates to the fields of cipher algorithm realization, side channel energy analysis and cipher module detection. In order to analyze the side channel energy of the cryptographic module implementing the SM3 cryptographic algorithm HMAC mode, analyze and obtain protected keys and sensitive information, the present invention proposes a side channel energy analysis method for the SM3 cryptographic algorithm HMAC mode. Background technique [0002] With the development of information technology, various cryptographic algorithms are being widely used in economic, military, administrative and other important departments to protect the security of information. In view of the importance of cryptographic algorithms, the analysis and research on cryptographic algorithm software and hardware implementation (cryptographic modules) is of great significance to the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06H04L29/06
CPCG06F21/556G06F21/00
Inventor 罗鹏曹伟琼李大为
Owner 国家密码管理局商用密码检测中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products