Unlock instant, AI-driven research and patent intelligence for your innovation.

A formal verification method and system for SM4 encryption algorithm

A formal verification and cryptographic algorithm technology, applied in the formal verification method and system field of SM4 cryptographic algorithm, can solve problems such as side channel attacks and memory security, to ensure memory security, avoid time side channel attacks, and ensure memory security sexual effect

Active Publication Date: 2022-05-17
SHANDONG COMP SCI CENTNAT SUPERCOMP CENT IN JINAN
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are problems with memory safety and side-channel attacks in conventional implementations of cryptographic algorithms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A formal verification method and system for SM4 encryption algorithm
  • A formal verification method and system for SM4 encryption algorithm
  • A formal verification method and system for SM4 encryption algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0050] see below figure 1 , figure 1 It is a flowchart of a formal verification method for the SM4 cryptographic algorithm based on the F* framework provided by the embodiment of the present application.

[0051] Specific steps can include:

[0052] S101: Define the algorithm parameter of the SM4 cryptographic algorithm as a safe integer type;

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a formal verification method of the SM4 cryptographic algorithm, the method comprising: defining the algorithm parameters of the SM4 cryptographic algorithm as a safe integer type; wherein, the algorithm parameters include plaintext input, encrypted result, ciphertext input, Decryption result, master key, key constant, round key and s box parameter; Determine the initial heap of the algorithm module based on F* frame, and add described algorithm parameter in the target buffer zone of described initial heap; Utilize all The algorithm parameters carry out formal verification to the round key generation module, encryption module and decryption module of the SM4 cryptographic algorithm, and obtain the formal verification result of the SM4 cryptographic algorithm. This application can ensure memory security and avoid time side channel attacks during the implementation of the SM4 cryptographic algorithm. The application also discloses a formal verification system of the SM4 cryptographic algorithm, which has the above beneficial effects.

Description

technical field [0001] This application relates to the field of network and information security services, and in particular to a formal verification method and system for the SM4 cryptographic algorithm. Background technique [0002] With the rapid development of Internet technology, computer network technology is widely used in all walks of life, and network security issues are increasingly concerned. The basis of network security is the security protocol, and the implementation of the security protocol depends on the cryptographic technology, which is used for password distribution and identity authentication in communication, so as to ensure the security of network communication. However, there are issues of memory safety and side-channel attacks in conventional implementations of cryptographic algorithms. [0003] Therefore, how to ensure memory security and avoid time side channel attacks during the implementation of the SM4 cryptographic algorithm is a technical prob...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/46
CPCG06F21/602G06F21/46
Inventor 陈振娅杨明吴晓明杨美红丁青艳穆超王鑫王彪王继志
Owner SHANDONG COMP SCI CENTNAT SUPERCOMP CENT IN JINAN