Second order side channel energy analysis method for SM4 cipher algorithm

A technology of energy analysis and cryptographic algorithm, applied in the direction of encryption device with shift register/memory, etc., can solve the problem of second-order energy analysis without systematic analysis method, etc.

Active Publication Date: 2014-05-28
国家密码管理局商用密码检测中心
View PDF3 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is no systematic analysis metho

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Second order side channel energy analysis method for SM4 cipher algorithm
  • Second order side channel energy analysis method for SM4 cipher algorithm
  • Second order side channel energy analysis method for SM4 cipher algorithm

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0056] The technical scheme of the present invention will be described in detail below. First, the SM4 cryptographic algorithm with the same S-box input and output intermediate mask value is used to perform CPA analysis to illustrate the technical scheme of the present invention. The typical implementation of the SM4 algorithm's first-order mask defense method is as follows image 3 As shown, the input value S_in and the output value S_out of the S box are both XORed by the mask value m=(m 0 , M 1 , M 2 , M 3 ). The newly constructed S′ box is j is 0, 1, 2, 3, x j Represents the jth byte in 32 bits x. For the first-order mask defense method of SM4 algorithm, Xor the input and output of the S box to eliminate the mask:

[0057] S _ InXorOut = S _ in ′ ⊕ S _ out ′ = S _ in ⊕ S _ out , Among them, j is 0, 1, 2, 3

[0058] S _ InXorOu t j = S ( X i + 1 , j ⊕ X i + 2 , j ⊕ X...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a second order side channel energy analysis method for an SM4 cipher algorithm. The method comprises the following steps: (1) collecting energy trace and establishing a sampling energy consumption matrix; (2) performing preprocessing on the measured energy consumption matrix in the above step; (3) choosing XOR S_InXorOutj of input/output of an S box to serve as an attack point, performing CPA or DPA analysis and obtaining correct round secret key byte rki,j; (4) repeating the step (2) and the step (3) to respectively obtain other secret key bytes of the round secret key and obtaining correct round secret keys; and (5) carrying out step (2) (3) and (4) on the front four rounds and back four rounds to obtain four round secret keys and obtaining an initial secret key through secret key reverse expansion. In the technical scheme, the new second order energy analysis method is provided innovatively, new situation of SM4 cipher algorithm attack is developed, side channel energy analysis means for the SM4 cipher algorithm is extended, and the side channel energy analysis for the SM4 cipher algorithm can be carried out more comprehensively and effectively. The method is targeted for the common mask protection measures and is high in practicality.

Description

technical field [0001] The invention belongs to the technical field of cryptographic algorithm analysis and detection, and specifically aims at realizing the second-order side channel energy analysis for the SM4 cryptographic algorithm with mask protection measures, and particularly relates to the secondary SM4 cryptographic algorithm with the same input and output middle mask of the S box. The first-order side channel energy analysis method. Background technique [0002] With the development of information technology, various cryptographic algorithms are being widely used in economic, military, administrative and other important departments to protect the security of information. In view of the importance of cryptographic algorithms, the analysis and research of cryptographic algorithm software and hardware implementation (cryptographic modules) is of great significance to protect information security. In recent years, several attacks on cryptographic modules have become k...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06
Inventor 李大为罗鹏曹伟琼
Owner 国家密码管理局商用密码检测中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products