Plaintext or ciphertext selection based side channel power analysis attack method on round function output of SM4 cipher algorithm

A technology of energy analysis attack and selected plaintext, which is applied in the field of cryptographic algorithm analysis and detection

Inactive Publication Date: 2014-12-10
CHENGDU UNIV OF INFORMATION TECH +2
View PDF4 Cites 41 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0072] The purpose of the present invention is to provide a method for selecting plaintext or ciphertext side-channel energy analysis attacks directed at the round function output of the SM4 cipher algorithm, so that the energy analysis method of the existing SM4 cipher algorithm cannot perform CPA with any bit output by the round function Or the problem of DPA side channel energy analysis attack, according to the actual computing power, you can choose the appropriate length of bits to attack, thus enhancing the analysis flexibility, effectiveness and success rate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Plaintext or ciphertext selection based side channel power analysis attack method on round function output of SM4 cipher algorithm
  • Plaintext or ciphertext selection based side channel power analysis attack method on round function output of SM4 cipher algorithm
  • Plaintext or ciphertext selection based side channel power analysis attack method on round function output of SM4 cipher algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0102] The specific embodiments of the present invention are described below so that those skilled in the art can understand the present invention, but it should be clear that the present invention is not limited to the scope of the specific embodiments. For those of ordinary skill in the art, as long as various changes Within the spirit and scope of the present invention defined and determined by the appended claims, these changes are obvious, and all inventions and creations using the concept of the present invention are included in the protection list.

[0103] A method for side-channel energy analysis attack of selected plaintext or ciphertext output for SM4 cipher algorithm round function, specifically comprising the following steps:

[0104] S1: Enter the value X by selecting plaintext or ciphertext i+0 、X i+1 、X i+2 and x i+3 , so that X i+1 、X i+2 and x i+3 The XOR result of the three is a fixed number, and the output C of each round of linear transformation L of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a plaintext or ciphertext selection based side channel power analysis attack method on round function output of the SM4 cipher algorithm. The method includes the steps of S1, selecting plaintext or ciphertext to input X<i+0>, X<i+1>, X<i+2> and X<i+3> on the condition of allowing the exclusive OR result of the X<i+1>, X<i+2> and X<i+3> to be a constant value and guaranteeing randomness of the X<i+0>, utilizing side channel power attack processes to attack the output C of linear transform L of each round of the first four round functions, and deducing inversely to acquire the round key rk of the first four round functions in encryption or decryption according to the output C; S2, according to the round keys rk<0>, rk<1>, rk<2> and rk<3> of the first four found functions, inversely calculating the initial key by a key expansion algorithm. The method can realize power analysis attack by means of multiple attacks and can attack with selection of proper-length bits according to actual computing capacity, thus flexibility, effectiveness and success rate of analysis are improved.

Description

technical field [0001] The invention relates to the field of cryptographic algorithm analysis and detection, in particular to a method for side-channel energy analysis attacks on selected plaintext or ciphertext outputted by SM4 cryptographic algorithm round functions. Background technique [0002] With the development of information and analysis circuit technology, the cracking of hardware cryptographic electronic equipment no longer simply stays on the protocol and algorithm, but starts with the information leaked in the process of processing data. In the process of processing information, hardware cryptographic electronic equipment leaks information such as energy, electromagnetics, errors, and time. Using these leaked information to attack cryptographic electronic equipment is the so-called Side Channel Attacks. It can be divided into energy analysis attack, electromagnetic attack, error attack, etc. Among them, energy analysis attack has become the main means of side ch...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/06H04L29/06
Inventor 杜之波吴震饶金涛王敏李大为罗鹏
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products