Smart card SM4 calculation based DPA attack and secret key restoring method and DPA attack and secret key restoring system
A technology of smart card and calculation method, which is applied in the field of smart card security, can solve the problems of SM4 algorithm DPA attack and realize key restoration method, and achieve good defense effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0055] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.
[0056] A DPA attack and key restoration method of the SM4 algorithm of a smart card, comprising the following steps:
[0057] Step 1: Perform DPA attacks on the first 4 rounds of the SM4 algorithm encryption process to obtain the subkeys of the first 4 rounds;
[0058] Step 2, use the obtained 4 round keys to restore the SM4 key.
[0059] In this example, if figure 1 as shown, figure 1 is the flow chart of the SM4 key expansion algorithm, MK=(MK 0 , MK 1 , MK 2 , MK 3 ) is the 128-bit key of SM4, where FK=(FK 0 ,FK 1 ,FK 2 ,FK 3 ) and CK=(CK 0 ,CK 1 ,CK 2 ,CK 3 ) are known system parameters and fixed parameters, respectively.
[0060] refer to figure 1 , the SM4 key expansion algorithm is as follows:
[0061] 1) K 0 =MK 0 ^FK 0 , K 1 =MK 1 ^FK 1 , K 2 =MK 2 ^FK 2 , K 3 =MK 3 ^FK 3 ;
[0062] 2) K 4 = K 0 ^T’(K 1...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com