White-box software implementation method of commercial code SM4 algorithm in standard ciphertext output format

A software implementation, encryption algorithm technology, applied in the field of information security, can solve problems such as unfavorable wireless LAN product key security

Active Publication Date: 2017-08-18
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF1 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] To sum up, no secure SM4 white-box algorithm has been proposed so far, which is not conducive to protecting the key security of wireless LAN products, and the cryptographic modules in the products have huge security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • White-box software implementation method of commercial code SM4 algorithm in standard ciphertext output format
  • White-box software implementation method of commercial code SM4 algorithm in standard ciphertext output format
  • White-box software implementation method of commercial code SM4 algorithm in standard ciphertext output format

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0079] The design idea of ​​the present invention is: each round of the algorithm is divided into three layers, each layer is confused by input or output transformation, the input and output transformation between layers is partially offset, and the layer containing the key is calculated by A lookup table is implemented, the key does not appear explicitly in the algorithm, and the key cannot be obtained by analyzing the intermediate data. In order to ensure that the output of the algorithm is in the standard ciphertext format, and at the same time protect the security of the initial and final round keys of the algorithm, we add the confusion matrix P in the first round. However, since the S-box nonlinear transformation cannot be restored after linear operations such as XOR and shift, the matrix must be canceled before passing through the S-box, and then added after passing through the S-box.

[0080] The present invention comprises the steps:

[0081] Step 1: Generate a set o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a white-box software implementation method of a commercial code SM4 algorithm in a standard ciphertext output format. In the method provided by the invention, 36 times of operation are needed, each operation is divided into three layer, each layer utilizes input or output conversion to mix, input/output conversion parts between the layers are counteracted, operation of the layer including a secret key is achieved by a lookup table, the secret key appears in the algorithm non-explicitly, and the secrete key cannot be acquired by analyzing intermediate data. According to theSM4 white-box algorithm designed by the invention, the secret key is hidden in the lookup tale, the lookup table is mixed by using linear conversion, combined analysis of the lookup table is resisted by using the composition of linear conversion, and thus the purpose of effectively protecting the secret key is achieved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a white-box software implementation method of a business secret SM4 algorithm in a standard cipher text output format. Background technique [0002] With the rapid development of network and computer technology applications, information security issues have become a major issue related to the national economy and people's livelihood. Traditional cryptography is built under the black box model, which assumes that the algorithm runs on a trusted terminal, and its running sub-results, memory, etc. are in a trusted environment that cannot be viewed or changed. However, the application of cryptography has spread to every corner of people's daily life, such as e-mail, web page access, digital content distribution, network transactions, e-government and so on. Although these applications are executed on a standard terminal, such as mobile phones and smart cards, they are u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08H04L9/30H04L29/06
CPCH04L9/0656H04L9/0838H04L9/0869H04L9/3093H04L63/0442
Inventor 周洁白健刘尚麟安红章
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products