Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Combined attack method for SM4 algorithm

A joint attack and algorithm technology, applied in the countermeasures of attack encryption mechanism, digital transmission system, electrical components, etc., can solve the problems of unfavorable attack analysis and achieve the effect of improving attack efficiency

Active Publication Date: 2018-11-23
成都三零嘉微电子有限公司
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0022] At present, the method for attacking SM4 is mainly to select plaintext for energy analysis attack. The number of selection rounds is large, and the selected attack point is a linear operation, which is not conducive to attack analysis.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Combined attack method for SM4 algorithm
  • Combined attack method for SM4 algorithm
  • Combined attack method for SM4 algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention proposes a method combining cross-round attack and differential analysis. This method only needs to select plaintext input for the first round and the third round. The basic idea is as follows:

[0039] Let X 4 Enter A for the first round of selection 1 =(a 0,1 , a 1,1 , a 2,1 , a 3,1 ,) the output result of the time wheel, at this time, the constraints for selecting the input are:

[0040] random

[0041] Then there are:

[0042] At this time T(A 1) is an unknown fixed value, X 0 is a random value, let the corresponding input of the second round be set to A 2 , the output of box S is B 2 , then there is

[0043]

[0044]

[0045] make

[0046] key 1 is a fixed value, so you can choose the key 1 To analyze the attack target for energy, the intermediate value of the attack is selected at this time as the output of the second round of S-box nonlinear transformation. key in attack 1 Afterwards, due to the key 1 There are t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a combined attack method for SM4 algorithm, combines the energy analysis attack and the differential analysis attack, and provides a combined attack method of energy analysis and differential analysis aiming for the SM4 algorithm. An S-box nonlinear output is selected as an attack intermediate value, and the sensitive intermediate values of the second round and the fourthround are attacked by selecting a plaintext to realize cross-round energy analysis and attack. A round secret key can be quickly calculated through differential analysis of the S box, and the attack efficiency is improved. In addition, the method can also be extended to joint attacks of all symmetric cryptographic algorithms.

Description

technical field [0001] The invention relates to the field of chip security attack detection. The present invention proposes a combined attack method for SM4 energy analysis attack and differential analysis. During the attack, a plaintext input with certain constraints is selected, and the principle of energy analysis attack is used to attack the second and fourth rounds of the SM4 algorithm to obtain a sensitive and fixed intermediate value, and then use the SM4 algorithm S-box differential analysis principle to obtain the round key of the first 4 rounds, and finally restore the original 128bit key, which expands the attack detection and analysis method of the SM4 algorithm. Background technique [0002] SM4 cryptographic algorithm includes encryption and decryption algorithm and key expansion algorithm. Both encryption and decryption algorithm and key expansion algorithm adopt 32 rounds of non-linear iterative structure. The block length of plain ciphertext and initial key ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L29/06
CPCH04L9/002H04L63/1416H04L63/1441
Inventor 饶金涛李军李雨励陈大钊何卫国
Owner 成都三零嘉微电子有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products