Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Template attack method in allusion to SM4 cipher algorithm round output

A template attack and cryptographic algorithm technology, applied in the field of cryptographic algorithm analysis and detection, can solve the problems of template attack, increase the difficulty of processing data and computational complexity, and infeasible template attack.

Active Publication Date: 2015-08-26
CHENGDU UNIV OF INFORMATION TECH +3
View PDF5 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0059] The purpose of the present invention is to provide a kind of template attack method for output of SM4 cipher algorithm round, to solve the problem that template attack is not feasible directly to SM4 cipher algorithm round output, namely: nonlinear transformation τ and linear transformation L of SM4 cipher algorithm Spread the influence of the wheel key to more bits of the wheel output, so when performing template attacks on the round output of the SM4 cipher algorithm, it is necessary to use the 32-bit method of the wheel output to build a template. At this time, the key search space and template space is [0, 2 32 -1], this space greatly increases the difficulty of data processing and computational complexity, making it infeasible to directly conduct template attacks on the SM4 cipher round output

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Template attack method in allusion to SM4 cipher algorithm round output
  • Template attack method in allusion to SM4 cipher algorithm round output
  • Template attack method in allusion to SM4 cipher algorithm round output

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0086] The specific embodiments of the present invention are described below so that those skilled in the art can understand the present invention, but it should be clear that the present invention is not limited to the scope of the specific embodiments. For those of ordinary skill in the art, as long as various changes Within the spirit and scope of the present invention defined and determined by the appended claims, these changes are obvious, and all inventions and creations using the concept of the present invention are included in the protection list.

[0087] The method for the template attack aimed at the SM4 cipher algorithm round output specifically comprises the following steps:

[0088] S1: Optionally input plaintext or ciphertext and a random known key, and establish a round output X i+4 (i=0,1,2,3) is the template for calculating the intermediate value of the Hamming weight / Hamming distance, and a total of 33 templates are established for each round of output. The...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a template attack method in allusion to SM4 cipher algorithm round output. According to the method disclosed by the invention, special channel input is taken as a premise, the SM4 algorithm round output is used as an attack point, the hamming weight or the hamming distance of the round output is selected to establish a template, and template attack in allusion to the SM4 cipher algorithm round output can be realized by a small number of templates. Meanwhile, selective input is taken as a basis in a template matching stage, a support vector machine is used to act as a tool for judgment and analysis, a bit of linear transformation output can be broken by only two times of matching, and then a round sub-key is reversely derived by inverse transformation of nonlinear transformation and linear transformation. The method disclosed by the invention effectively solves a problem that template attack in allusion to the SM4 cipher algorithm round number is infeasible at the present stage.

Description

technical field [0001] The invention relates to the field of analysis and detection of cryptographic algorithms, in particular to a template attack method aimed at the round output of SM4 cryptographic algorithms. Background technique [0002] With the development of information and analysis circuit technology, the cracking of hardware cryptographic electronic equipment no longer simply stays on the protocol and algorithm, but starts with the information leaked in the process of processing data. In the process of processing information, hardware cryptographic electronic equipment leaks information such as energy, electromagnetics, errors, and time. Using these leaked information to attack cryptographic electronic equipment is the so-called Side Channel Attacks (Side Channel Attacks). It can be divided into energy analysis attack, electromagnetic attack, error attack, etc. Among them, energy analysis attack has become the main means of side channel because of its high efficie...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06
Inventor 杜之波吴震饶金涛王敏李大为罗鹏赵东艳张海峰唐晓柯胡晓波甘杰刘辉志
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products