Differential fault attack injection attack aimed at SMS4 cryptographic algorithm

A cryptographic algorithm, differential fault technology, applied in the field of cryptographic algorithm analysis and detection, can solve problems such as difficult control

Inactive Publication Date: 2016-01-06
成都芯安尤里卡信息科技有限公司
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0033] The purpose of the present invention is to provide a differential fault attack method against the SMS4 cryptographic algorithm to solve two practical problems: (1) the problem that some special bytes in an intermediate state cannot be induced to generate specific faults, that is

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Differential fault attack injection attack aimed at SMS4 cryptographic algorithm
  • Differential fault attack injection attack aimed at SMS4 cryptographic algorithm
  • Differential fault attack injection attack aimed at SMS4 cryptographic algorithm

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0059] The following describes the specific embodiments of the present invention so that those skilled in the art can understand the present invention, but it should be clear that the present invention is not limited to the scope of the specific embodiments. For those of ordinary skill in the art, as long as various changes are made in These changes are obvious within the spirit and scope of the present invention defined and determined by the appended claims, and all inventions and creations that utilize the concept of the present invention are protected.

[0060] The fault injection attack method for SMS4 password algorithm includes the following steps:

[0061] S1: Determine a group of plain text X, and obtain the correct cipher text Y of the group of plain text X in the normal state and the wrong cipher text Y in the fault injection state.

[0062] S11: Determine a group of plaintext X, and obtain the correct ciphertext Y of the group of plaintext X under the correct key K.

[0063...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a differential fault attack injection attack aimed at a SMS4 cryptographic algorithm. The attack injects fault into last four rounds of operation of encryption process of the SMS4 cryptographic algorithm, consequently makes the last four rounds of the encryption process generate any error, and attacks through an error cipher text generated by the error. In selection of the error cipher text, by comparing with a correct cipher text, the error cipher text with same plain text, different cipher text and complete data information is selected out for being used in subsequent differential analysis. Aimed at each round of attack, the error cipher text used is identical, and classification of the cipher text according to the requirement of each round is not needed. The method provided by the invention solves the problem of failure of directionally inducing special bytes to generate a special error and the problem of performing fault injection again for each round of attack at the present stage.

Description

technical field [0001] The invention relates to the field of cryptographic algorithm analysis and detection, in particular to a differential fault injection attack aimed at the SMS4 cryptographic algorithm. Background technique [0002] Under normal circumstances, hardware devices or software programs that run cryptographic algorithms can correctly execute various cryptographic algorithms, but in the case of interference, the cryptographic operation module may have register errors or operations, and use these erroneous behaviors or information to recover The key method is called cryptographic error analysis. Most cryptographic devices are implemented based on electronic technology, the interface is relatively simple, and they are more susceptible to external interference, which makes fault injection analysis one of the most effective bypass analysis methods. [0003] Fault injection is to change the working conditions of the encryption chip at certain appropriate times, so ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00
Inventor 吴震王敏饶金涛杜之波荣雪芳
Owner 成都芯安尤里卡信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products