Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A side channel energy attack method for linear transformation output of sm4 cipher

A linear transformation and energy analysis attack technology, applied in the field of cryptographic algorithm analysis and detection, can solve problems such as wheel key attacks

Active Publication Date: 2018-04-13
CHENGDU UNIV OF INFORMATION TECH +2
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0070] The purpose of the present invention is to provide a side channel energy attack method aimed at the linear transformation output of the SM4 cryptographic algorithm, to solve the diffusion effect of the linear transformation on the key, resulting in the inability to use the linear transformation output as the attack intermediate data to directly attack the wheel key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A side channel energy attack method for linear transformation output of sm4 cipher
  • A side channel energy attack method for linear transformation output of sm4 cipher
  • A side channel energy attack method for linear transformation output of sm4 cipher

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0120] The specific embodiments of the present invention are described below so that those skilled in the art can understand the present invention, but it should be clear that the present invention is not limited to the scope of the specific embodiments. For those of ordinary skill in the art, as long as various changes Within the spirit and scope of the present invention defined and determined by the appended claims, these changes are obvious, and all inventions and creations using the concept of the present invention are included in the protection list.

[0121] The side channel energy attack method aimed at the linear transformation output of the SM4 cryptographic algorithm specifically includes the following steps:

[0122] S1: Select the bytes of two attacks, each corresponding input is (X i+1 ⊕X i+2 ⊕X i+3 ) and the bytes corresponding to the bytes to be attacked are random numbers, and the others are fixed numbers. Use the side channel energy attack method to attack t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a side channel energy analysis attack method aimed at the linear transformation output of the SM4 cryptographic algorithm, comprising the following steps: S1: selecting the bytes for two attacks, each corresponding input is (Xi+1⊕Xi+2⊕ Xi+3) The byte corresponding to the byte to be attacked is a random number, and the others are fixed numbers. Use the side channel energy attack method to attack the byte of the wheel key and the corresponding fixed number in the linear transformation. The round key bytes and fixed numbers of the second attack can be calculated accordingly to obtain the complete wheel key rki, where i=0,1,2,3; S2: According to the first four rounds of the wheel key rk0, rk1, rk2, and rk3 reversely calculate the initial key through the key expansion algorithm. Using the above analysis method not only realizes the side channel energy analysis attack on SM4 linear transformation output, but also reduces the number of attacks required to attack the complete key, and enhances the attack efficiency and success rate.

Description

technical field [0001] The invention relates to the field of cryptographic algorithm analysis and detection, in particular to a method for side channel energy attack aimed at the linear transformation output of the SM4 cryptographic algorithm. Background technique [0002] With the development of information and analysis circuit technology, the cracking of hardware cryptographic electronic equipment no longer simply stays on the protocol and algorithm, but starts with the information leaked in the process of processing data. In the process of processing information, hardware cryptographic electronic equipment leaks information such as energy, electromagnetics, errors, and time. Using these leaked information to attack cryptographic electronic equipment is the so-called Side Channel Attacks (Side Channel Attacks). It can be divided into energy analysis attack, electromagnetic attack and error attack, etc. Among them, energy analysis attack is more efficient and becomes the ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
Inventor 杜之波吴震饶金涛王敏李大为罗鹏
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products