Mask method and device for resisting power attack in SM4 algorithm

A mask and algorithm technology, applied in the field of information security, can solve the problem of ineffective resistance to differential energy attacks, and achieve the effect of resisting energy attacks

Active Publication Date: 2015-05-20
STATE GRID CORP OF CHINA +1
View PDF2 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the attacker XORs two intermediate results with the same mask value, the influence of the random mask value can be eliminated, then the technique is still not effective against differential energy attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mask method and device for resisting power attack in SM4 algorithm
  • Mask method and device for resisting power attack in SM4 algorithm
  • Mask method and device for resisting power attack in SM4 algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] In Embodiment 1, different random masks are introduced in the first and second rounds of SM4 operations, and the corresponding modified S boxes are also different from the modified masks; the same random masks are introduced in the 3rd to 30th rounds of SM4 operations, and the corresponding The corrected S-box is the same as the corrected mask; different random masks are introduced in the 32nd and 33rd rounds of SM4 operations, and the corresponding corrected S-box and corrected mask are also different; the random number generator randomly generates five random masks, They are 32bit random mask M1, 32bit random mask M2, 32bit random mask M3, 32bit random mask M4 and 32bit random mask M. The input 128bit plaintext X is: X=(X 0 ,X 1 ,X 2 ,X 3 ), the specific algorithm flow is as follows.

[0046] see Figure 4 As shown, a 32-bit random mask M1 is introduced in the first round, and the modified S box S1' box and the modified mask M1' of the first round are determined ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mask method and a device for resisting a power attack in an SM4 algorithm. The method comprises the following steps of obtaining a first random mask and carrying out OR operation on the first random mask and a first round of key; determining a first round of correction S box on the basis of the original first round of S box according to the first random mask and enabling the first round of correction S box to replace the original first round of S box; determining a first correction mask according to the first random mask and carrying out XOR operation on the outputs of the first correction mask and an L linear displacement; making the second to thirty-two rounds of the algorithm processes be the same as the first round of the algorithm process, introducing the same random mask or the different random masks into each round and determining the corresponding correction S box and the correction mask. Through introducing the same mask or the different masks into each round, mask values brought by intermediate results for vulnerable round operations are different, so that the power attack can be effectively resisted.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to an SM4 algorithm anti-energy attack masking method and device. Background technique [0002] With the development of information and digital society, people's awareness of the importance of information security and confidentiality continues to increase. Encryption technology allows some important data to be stored on unsafe computers or transmitted over unsafe channels, and only the party holding the legal key can obtain the plaintext. The SM4 algorithm is the first commercial block cipher algorithm announced by domestic officials in February 2006, and it is the block algorithm recommended by China's wireless LAN security standards. [0003] Designers of encryption systems usually consider secret information to be processed in a closed and trusted computing environment, so they focus on the security of protocols and mathematical algorithms. Unfortunately, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/28
CPCH04L9/002H04L9/008H04L9/06H04L9/0656H04L9/08H04L9/30H04L9/32H04L63/08
Inventor 于艳艳胡晓波李娜张茜歌甘杰
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products