Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

SM4 algorithm white box implementation method and device

An implementation method and white-box technology, which is applied in the fields of information security and cryptography applications, can solve problems such as confusion of cryptographic algorithms, failure of SM4 white-box algorithms and products to meet practical applications, and poor versatility of SM4 white-box algorithms.

Active Publication Date: 2019-06-28
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these algorithms mainly confuse the cryptographic algorithm through linear transformation, and hide the key information in the lookup table. The security is not high, and it is easy to calculate the hidden key information through BGE attack and other attack methods.
There are also some SM4 white-box algorithms that use nonlinear transformation for obfuscation, but the essence of the algorithm has changed compared with the standard SM4 algorithm, that is, the ciphertext encrypted with the white-box algorithm cannot be correctly decrypted by the standard SM4 decryption algorithm
Such SM4 white-box algorithm has poor versatility and limited use occasions
[0004] In order to safely use the SM4 cryptographic algorithm in a complex and changeable environment, SM4 white-box algorithms and products with high security and versatility are required, and the existing SM4 white-box algorithms and products cannot meet the needs of practical applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SM4 algorithm white box implementation method and device
  • SM4 algorithm white box implementation method and device
  • SM4 algorithm white box implementation method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] Such as figure 1 Shown, a kind of SM4 algorithm white-box implementation method comprises the following steps:

[0061] S1, 128-bit input data (X 0 ,X 1 ,X 2 ,X 3 ) to obtain 128-bit data (X 0 ’,X 1 ’,X 2 ’,X 3 ');

[0062] S2, (X 0 ’,X 1 ’,X 2 ’,X 3 ’) After 32 rounds of compound transformation, 128-bit data (X 32 ’,X 33 ’,X 34 ’,X 35 '); the compound transformation of each round is composed of round scrambling transformation and round function, assuming 0≤i≤31, in the compound transformation of the i-th round, the input of the round scrambling transformation is 128 bits Data (X i ’,X i+1 ’,X i+2 ’,X i+3 ’), the output is 128-bit data (M i,0 , M i,1 , M i,2 , M i,3 ), the input of the round function in this round is (M i,0 , M i,1 , M i,2 , M i,3 ), the output is 32-bit data X i+4 ’; where the round key of each round is generated by the encryption key and hidden in the round function;

[0063] S3, (X 32 ’,X 33 ’,X 34 ’,X 35 ’) get the ...

Embodiment 2

[0095] Based on the same inventive concept as the above-mentioned method, as figure 2 As shown, the present embodiment is a white-box implementation device for SM4 algorithm, including an entry transformation unit, a composite transformation unit, and an exit transformation unit, and the composite transformation unit is connected to the entry transformation unit and the exit transformation unit respectively; The compound transformation unit includes a round scrambling transformation module and a round function module;

[0096] The entry conversion unit will input 128-bit data (X 0 ,X 1 ,X 2 ,X 3 ) for entry conversion to obtain 128-bit data (X 0 ’,X 1 ’,X 2 ’,X 3 '); the composite transformation unit will (X 0 ’,X 1 ’,X 2 ’,X 3 ’) to perform 32 rounds of compound transformations to obtain 128-bit data (X 32 ’,X 33 ’,X 34 ’,X 35 ’); the export transformation unit will (X 32 ’,X 33 ’,X 34 ’,X 35 ’) to carry out export conversion, and obtain the 128-bit output...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an SM4 algorithm white box implementation method and device. The cryptographic algorithm is confused through round scrambling transformation in entry transformation, exit transformation and composite transformation, and a round key is hidden in a round function. Compared with the prior art, the method has the advantages that a mode of combining linear transformation and nonlinear transformation is adopted in entry transformation, exit transformation and round scrambling transformation, so that the scheme is difficult to crack under the condition of using an existing attack method, has very high safety, can obtain an encryption and decryption result which is completely the same as that of an SM4 standard algorithm, and has good universality. Through the parallel design of the transformation and the realization of the transformation by using the lookup table, the scheme can have the characteristics of high speed and high security in the encryption and decryption process, and can be widely applied to various environments needing to use an SM4 algorithm.

Description

technical field [0001] The invention relates to the technical fields of information security and cryptography application, in particular to a white-box implementation method and device for an SM4 algorithm. Background technique [0002] The SM4 algorithm is a block symmetric cipher algorithm independently designed by my country. It is published by the National Commercial Cryptography Administration as a commercial block cipher standard algorithm. It is often used for data encryption protection in wireless LANs and other environments. The SM4 algorithm often needs to be used in an untrustworthy environment, and many systems and terminals using the SM4 algorithm are not equipped with hardware encryption modules such as encryption chips, TF cards, and USBKeys, and can only rely on software encryption modules to complete encryption. The dynamic process of computing and software encryption and decryption is visible to the attacker, and the key can only be stored in the local stor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06
Inventor 廖正赟刘熙胖刘长河梁松涛孙晓鹏雷宇龙武宗品刘武忠彭金辉
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More