Side channel energy analysis method for ZUC cryptographic algorithm with mask protection

A cryptographic algorithm, energy analysis technology, applied in wireless communication, secure communication device, security device, etc., can solve the problem of not being able to know the mask and so on

Inactive Publication Date: 2015-07-29
国家密码管理局商用密码检测中心
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The mask is generated inside the cryptographic device and is different for each execution, so the attacker cannot learn the mask

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Side channel energy analysis method for ZUC cryptographic algorithm with mask protection
  • Side channel energy analysis method for ZUC cryptographic algorithm with mask protection
  • Side channel energy analysis method for ZUC cryptographic algorithm with mask protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0104] The technical solution of the present invention is described in detail below. First, the first-order simple mask protection method is introduced. In order to save the storage space of the S box and speed up the efficiency of the mask, the designer will use one S box on the left and right sides of the F function of the ZUC algorithm 32-bit random number m for mask pre-calculation, output Then the output of 8 S-boxes only needs to pre-calculate 4 S-boxes. If the realization is more efficient, m=(m 0 , m 1 , m 0 , m 1 ), where m 0 , m 1 are all 8-bit random numbers, only two S-boxes need to be preprocessed. Such as image 3 The first-order mask S-box defense mode of the ZUC algorithm is shown, and the inputs of the left and right S-boxes are respectively S _ in R ′ = S _ in ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a side channel energy analysis method for the ZUC cryptographic algorithm with mask protection. The method includes: (1) establishing an energy consumption matrix E, and preprocessing to obtain an energy consumption matrix E'; (2) selecting left and right S-box output xor values S_XorOutr as attack points to obtain a middle matrix V or respectively adopting Hamming weight and single bits to determine a DPA (differential power analysis) discrimination function D; (3) calculating a simulated energy consumption matrix H and two average energy consumption matrixes D0 and D1; (4) calculating a correlation coefficient matrix R between H and E', and selecting predictive values corresponding to maximum rp,q to obtain correct keys; or determining the correct keys by selecting the predictive values corresponding to maximum delta dpq according to an equation that delta D is equal to D1-D0; (5) sequentially calculating for five times, and repeating the step two to step four to obtain all key information. By the technical scheme, the defect of lack of specific attack methods for the ZUC cryptographic algorithm with mask protection is solved, a novel two-order energy analysis method is provided innovatively, opening up a ZUC cryptographic algorithm attack situation is realized, and expansion of side channel energy analysis means is realized as well.

Description

technical field [0001] The invention belongs to the technical field of cryptographic algorithm analysis and detection, and relates to performing side-channel energy analysis on Zu Chong's sequence cipher algorithm (ZUC) with mask protection measures in the process of cryptographic algorithm realization, side-channel energy analysis, and cryptographic module detection, to obtain protected The key k of , that is, the side channel energy analysis method for Zu Chongzhi's cryptographic algorithm with mask protection. Background technique [0002] With the development of information technology, various cryptographic algorithms are being widely used in economic, military, administrative and other important departments to protect the security of information. In view of the importance of cryptographic algorithms, the analysis and research of cryptographic algorithm software and hardware implementation (cryptographic modules) is of great significance to protect information security. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04W84/18H04W12/00H04W12/04
Inventor 罗鹏李大为曹伟琼秦小龙莫凡
Owner 国家密码管理局商用密码检测中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products