Template attacking method for SM4 password algorithm selective input on basis of Hamming weight

A Hamming weight and template attack technology, which is applied in the field of cryptographic algorithm analysis and detection, can solve the problems of creating a large number of templates, a large amount of data, and a large amount of calculation

Active Publication Date: 2015-06-17
CHENGDU UNIV OF INFORMATION TECH +3
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0037] The purpose of the present invention is to provide a kind of method for the side channel energy analysis template attack of the Hamming weight of SM4 cryptographic algorithm round function input, to solve the existing SM4 cryptographic algorithm template attack method to set up the prob

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Template attacking method for SM4 password algorithm selective input on basis of Hamming weight
  • Template attacking method for SM4 password algorithm selective input on basis of Hamming weight
  • Template attacking method for SM4 password algorithm selective input on basis of Hamming weight

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0062] The following describes the specific embodiments of the present invention to facilitate those skilled in the art to understand the present invention, but it should be clear that the present invention is not limited to the scope of the specific embodiments, for those of ordinary skill in the art, as long as various changes These changes are obvious within the spirit and scope of the present invention defined and determined by the appended claims, and all inventions and creations that utilize the concept of the present invention are protected.

[0063] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and simulation embodiments.

[0064] S1: In the stage of creating a template, randomly select the input to make the input plaintext or ciphertext X 0 , X 1 , X 2 And X 3 Set up round input M=(X i+1 ⊕X i+2 ⊕X i+3 ⊕rk i )(i=0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a template attacking method for an SM4 password algorithm. In the method, the SM4 algorithm selective input serves as an attacking point, and the Hamming weight is selected to establish templates, and the complete SM4 template attacking can be achieved with a small number of templates; meanwhile, selective plaintext input serves as a basis at the template matching stage, a support vector machine serves as a tool for judgment and analysis, and a bit of a subkey can be decrypted through only two times of matching. The method effectively solves the problems that through other methods at a current stage, for template attacking, too many template data exist and the calculation amount is too large.

Description

Technical field [0001] The present invention relates to the field of cryptographic algorithm analysis and detection, and in particular to a method for template attack on Hamming weight input by SM4 cryptographic algorithm wheel. Background technique [0002] With the development of information and analysis circuit technology, the cracking of hardware cryptographic electronic devices no longer simply stays on the protocol and algorithm, but starts with the information leaked in the process of processing data. In the information processing engineering of hardware cryptographic electronic equipment, there is leakage of information such as energy, electromagnetics, errors, and time. Using this leaked information to attack cryptographic electronic equipment is the so-called Side Channel Attacks. It can be divided into energy analysis attacks, electromagnetic attacks and error attacks, among which energy analysis attacks have become the main means of side channels due to their high eff...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06
Inventor 王敏吴震饶金涛李大为罗鹏赵东艳张海峰唐晓柯胡晓波甘杰刘辉志
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products