Second-order side channel energy analysis method for SM4 algorithm of simple mask

An energy analysis and side channel technology, which is applied in the field of cryptographic algorithm analysis and detection, and can solve problems such as second-order energy analysis without a systematic analysis method.

Active Publication Date: 2014-03-19
国家密码管理局商用密码检测中心
View PDF5 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is no systematic analysis method for the second-order energy analysis of masks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Second-order side channel energy analysis method for SM4 algorithm of simple mask
  • Second-order side channel energy analysis method for SM4 algorithm of simple mask
  • Second-order side channel energy analysis method for SM4 algorithm of simple mask

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The technical solution of the present invention is described in detail below, and the SM4 encryption algorithm with the same middle mask value output by the S box is used for CPA analysis to illustrate the technical solution of the present invention.

[0056] A typical implementation of the first-order mask defense method of the SM4 algorithm is as follows: image 3 As shown, for the i-th round of addition / solution operation of the SM4 algorithm, the output value S_out of the S box XORs the mask value n to obtain Where n=(a, a, a, a), a is an 8-bit random number. The newly constructed S′ box is j is sequentially 0, 1, 2, 3, x j Represents the jth byte in 32-bit x. For a masking scheme with consistent S-box output mask values, The mask is eliminated in two steps. First, the output of the jth (j∈{1, 2, 3}) is selected from the last three S-boxes and the output of the 0th S-box is XORed to remove the mask, that is S _ Xor ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a second-order side channel energy analysis method for an SM4 algorithm of a simple mask. To achieve mask protection for the SM4 algorithm with the output of four S boxes carrying the same mask value, the method comprises the steps of (1) acquiring energy traces and establishing a sampling energy consumption matrix; (2) preprocessing the energy consumption matrix in the previous step; (3) selecting attack points to conduct CPA or DPA to obtain rki, 0; (4) re-selecting an S-box operation part and following the steps (2) and (3) to obtain rki, u through analysis; and (5) carrying out the steps (2), (3) and (4) on previous/next four rounds to obtain a round key and obtaining an initial key through a key inverse expansion operation. The technical scheme of the invention innovatively provides the new second-order energy analysis method, develops a new situation of SM4 cryptographic algorithm attack, extends the side channel power analysis method for the SM4 algorithm, and can fully and effectively conducts side channel energy analysis on the SM4 cryptographic algorithm; and the method of the technical scheme is highly practical for common mask protection measures.

Description

technical field [0001] The invention belongs to the technical field of cryptographic algorithm analysis and detection, and specifically aims at realizing the second-order side channel energy analysis for the SM4 cryptographic algorithm with mask protection measures, and particularly relates to the secondary SM4 cryptographic algorithm with the same input and output middle mask of the S box. The first-order side channel energy analysis method. Background technique [0002] With the development of information technology, various cryptographic algorithms are being widely used in economic, military, administrative and other important departments to protect the security of information. In view of the importance of cryptographic algorithms, the analysis and research of cryptographic algorithm software and hardware implementation (cryptographic modules) is of great significance to protect information security. In recent years, several attacks on cryptographic modules have become k...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
Inventor 罗鹏李大为曹伟琼
Owner 国家密码管理局商用密码检测中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products