Side channel energy attack method aiming at SM4 password linear transformation output

A linear transformation and energy analysis attack technology, applied in the field of cryptographic algorithm analysis and detection, can solve problems such as wheel key attacks

Active Publication Date: 2015-07-01
CHENGDU UNIV OF INFORMATION TECH +2
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0070] The purpose of the present invention is to provide a side channel energy attack method aimed at the linear transformation output of the SM4 cryptographic algorithm, to solve the di

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Side channel energy attack method aiming at SM4 password linear transformation output
  • Side channel energy attack method aiming at SM4 password linear transformation output
  • Side channel energy attack method aiming at SM4 password linear transformation output

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0120] The specific embodiments of the present invention are described below so that those skilled in the art can understand the present invention, but it should be clear that the present invention is not limited to the scope of the specific embodiments. For those of ordinary skill in the art, as long as various changes Within the spirit and scope of the present invention defined and determined by the appended claims, these changes are obvious, and all inventions and creations using the concept of the present invention are included in the protection list.

[0121] The side channel energy attack method aimed at the linear transformation output of the SM4 cryptographic algorithm specifically includes the following steps:

[0122] S1: Select the bytes for two attacks, and each corresponding input is (X i+1 ⊕X i+2 ⊕X i+3 ) and the bytes corresponding to the bytes to be attacked are random numbers, and the others are fixed numbers. Use the side channel energy attack method to att...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a side channel energy attack method aiming at SM4 password linear transformation output. The method includes the following steps: S1 selecting bytes to be attacked twice, wherein the corresponding digits input each time are bytes in (Xi+1 Xi+2 Xi+3), the bytes corresponding to the bytes to be attacked are random digits, and others are fixed digits, adopting the side channel energy attack method to first attack bytes of a round key and the fixed digits in linear transformation, conducting corresponding computing on the bytes and the fixed digits of the round key obtained through the two-time attack to obtain the complete round key rki, wherein i= 0, 1, 2, 3; S2 conducting reversible calculation to obtain an initial key through a key expansion algorithm according to rk0, rk1, rk2 and rk3 of first four rounds of the round keys. By means of the analysis method, side channel energy analysis attack aiming at SM4 linear transformation output is achieved, attack times required by attack of the complete key are reduced, and attack efficiency and success rate are improved.

Description

technical field [0001] The invention relates to the field of cryptographic algorithm analysis and detection, in particular to a method for side channel energy attack aimed at the linear transformation output of the SM4 cryptographic algorithm. Background technique [0002] With the development of information and analysis circuit technology, the cracking of hardware cryptographic electronic equipment no longer simply stays on the protocol and algorithm, but starts with the information leaked in the process of processing data. In the process of processing information, hardware cryptographic electronic equipment leaks information such as energy, electromagnetics, errors, and time. Using these leaked information to attack cryptographic electronic equipment is the so-called Side Channel Attacks (Side Channel Attacks). It can be divided into energy analysis attack, electromagnetic attack and error attack, etc. Among them, energy analysis attack is more efficient and becomes the ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08
Inventor 杜之波吴震饶金涛王敏李大为罗鹏
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products