Smart card SM4 calculation based DPA attack and secret key restoring method and DPA attack and secret key restoring system

A technology of smart card and calculation method, which is applied in the field of smart card security, can solve the problems of SM4 algorithm DPA attack and realize key restoration method, and achieve good defense effect

Active Publication Date: 2014-01-29
BEIJING WATCH DATA SYST
View PDF2 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the DPA attack has been implemented against encryption algorithms such as DES, but...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Smart card SM4 calculation based DPA attack and secret key restoring method and DPA attack and secret key restoring system
  • Smart card SM4 calculation based DPA attack and secret key restoring method and DPA attack and secret key restoring system
  • Smart card SM4 calculation based DPA attack and secret key restoring method and DPA attack and secret key restoring system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0056] A DPA attack and key restoration method of the SM4 algorithm of a smart card, comprising the following steps:

[0057] Step 1: Perform DPA attacks on the first 4 rounds of the SM4 algorithm encryption process to obtain the subkeys of the first 4 rounds;

[0058] Step 2, use the obtained 4 round keys to restore the SM4 key.

[0059] In this example, if figure 1 as shown, figure 1 is the flow chart of the SM4 key expansion algorithm, MK=(MK 0 , MK 1 , MK 2 , MK 3 ) is the 128-bit key of SM4, where FK=(FK 0 ,FK 1 ,FK 2 ,FK 3 ) and CK=(CK 0 ,CK 1 ,CK 2 ,CK 3 ) are known system parameters and fixed parameters, respectively.

[0060] refer to figure 1 , the SM4 key expansion algorithm is as follows:

[0061] 1) K 0 =MK 0 ^FK 0 , K 1 =MK 1 ^FK 1 , K 2 =MK 2 ^FK 2 , K 3 =MK 3 ^FK 3 ;

[0062] 2) K 4 = K 0 ^T’(K 1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a smart card SM4 calculation based DPA attack and secret key restoring method and a smart card SM4 calculation based DPA attack and secret key restoring system, and belongs to the field of smart card safety. The smart card SM4 calculation based DPA attack and secret key restoring method includes, step 1, performing DPA attack to the first four rounds in SM4 calculation encrypting process to acquire sub keys of the first four rounds; step 2, utilizing the acquired sub keys of the first four rounds to restore SM4 secret keys. With the DPA attack and secret key restoring method and the DPA attack and secret key restoring system, DPA attack to the SM4 calculation of smart cards, restoration of SM4 encrypted secret keys and verification of anti-attack capacity of SM4 calculation of smart cards can be realized.

Description

technical field [0001] The invention belongs to the field of smart card security, and in particular relates to a method and system for DPA attack and key recovery of smart card SM4 algorithm. Background technique [0002] The SM4 algorithm is one of the encryption industry standards approved by the State Cryptography Administration in 2012, and belongs to the block cipher symmetric encryption algorithm. Both the packet length and the key length of the SM4 algorithm are 128 bits. The encryption algorithm and the key expansion algorithm adopt a 32-round nonlinear iterative structure. The operations used in each round of the encryption process include XOR operations, nonlinear t-transformation and linear L-transformation, among which 16*16 S-box in length size. The structure of the SM4 decryption algorithm is the same as that of the encryption algorithm, except that the order in which the round keys are used is reversed, and the decryption round key is the reverse order of th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/06
Inventor 宫亚明张擎
Owner BEIJING WATCH DATA SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products