A method of choosing plaintext or ciphertext side-channel energy analysis attack on round function output of sm4 cipher algorithm

A technique of energy analysis attack and selection of plaintext, applied in the field of cryptographic algorithm analysis and detection, to achieve the effect of enhancing flexibility

Inactive Publication Date: 2018-07-03
CHENGDU UNIV OF INFORMATION TECH +2
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0070] The purpose of the present invention is to provide a method for selecting plaintext or ciphertext side-channel energy analysis attacks directed at the round function output of the SM4 cipher algorithm, so that the energy analysis method of the existing SM4 cipher algorithm cannot perform CPA with any bit output by the round function Or the problem of DPA side channel energy analysis attack, according to the actual computing power, you can choose the appropriate length of bits to attack, thus enhancing the analysis flexibility, effectiveness and success rate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of choosing plaintext or ciphertext side-channel energy analysis attack on round function output of sm4 cipher algorithm
  • A method of choosing plaintext or ciphertext side-channel energy analysis attack on round function output of sm4 cipher algorithm
  • A method of choosing plaintext or ciphertext side-channel energy analysis attack on round function output of sm4 cipher algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0100] The specific embodiments of the present invention are described below so that those skilled in the art can understand the present invention, but it should be clear that the present invention is not limited to the scope of the specific embodiments. For those of ordinary skill in the art, as long as various changes Within the spirit and scope of the present invention defined and determined by the appended claims, these changes are obvious, and all inventions and creations using the concept of the present invention are included in the protection list.

[0101] A method for side-channel energy analysis attack of selected plaintext or ciphertext output for SM4 cipher algorithm round function, specifically comprising the following steps:

[0102] S1: Enter the value X by selecting plaintext or ciphertext i+0 、X i+1 、X i+2 and x i+3 , so that X i+1 、X i+2 and x i+3 The XOR result of the three is a fixed number, and the output C of each round of linear transformation L of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for side-channel energy analysis attack of selected plaintext or ciphertext outputted by round function of SM4 cipher algorithm, comprising the following steps: S1: input Xi+0, Xi+1, Xi+by selecting plaintext or ciphertext 2 and Xi+3, and make it satisfy that the XOR result of Xi+1, Xi+2 and Xi+3 is a fixed value, and at the same time ensure the randomness of Xi+0, and use the side channel energy attack method to attack the first four rounds Each round of the round function linearly transforms the output Ci of L, and then derives the round key rki of the first four round functions of the encryption operation or decryption operation from the output Ci; S2: according to the wheel key of the first four round functions rk0, rk1, rk2 and rk3 reversely calculate the initial key through the key expansion algorithm. Using the above analysis method, energy analysis attacks can be implemented through multiple attacks, and bits of appropriate length can be selected for attacks according to actual computing capabilities. Thereby enhancing the flexibility, effectiveness and success rate of the analysis.

Description

technical field [0001] The invention relates to the field of cryptographic algorithm analysis and detection, in particular to a method for side-channel energy analysis attacks on selected plaintext or ciphertext outputted by SM4 cryptographic algorithm round functions. Background technique [0002] With the development of information and analysis circuit technology, the cracking of hardware cryptographic electronic equipment no longer simply stays on the protocol and algorithm, but starts with the information leaked in the process of processing data. In the process of processing information, hardware cryptographic electronic equipment leaks information such as energy, electromagnetics, errors, and time. Using these leaked information to attack cryptographic electronic equipment is the so-called Side Channel Attacks. It can be divided into energy analysis attack, electromagnetic attack, error attack, etc. Among them, energy analysis attack has become the main means of side ch...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L9/06H04L29/06
Inventor 杜之波吴震饶金涛王敏李大为罗鹏
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products