期刊文献+

WIST:基于三维查找表的SM4算法新型白盒设计

WIST: White-Box Implementation of SM4 Algorithm with Three-Dimensional Lookup Table
下载PDF
导出
摘要 随着密码攻击方式更加多样、隐蔽且破坏性更强,密码分析者可能拥有越来越多的攻击权限与攻击能力,甚至能够获取算法的内部结构.为了更有效保护密钥,本文提出一种基于三维查找表的白盒SM4密码算法实现方案WIST.首先将SM4分组密码算法的线性变换用矩阵表示,设计了能对密钥信息进行隐藏保护的三维查找表,利用输入编码和输出编码对查找表混淆处理,同时采用仿射函数作为外部编码,完成了SM4算法的白盒化实现,并验证了此算法的正确性.效率分析表明WIST占用内存空间适中,具有较高安全性;安全性分析表明WIST能抵抗BGE攻击、MGH攻击、侧信道攻击、线性攻击与差分攻击等常见攻击类型.WIST可以在白盒攻击环境下更好地保护密钥信息. As cryptographic attacks become more diverse,covert and destructive,cryptanalysts are assumed to have more power and capabilities than before,and are able to obtain the internal structure of the target cryptographic algorithms. In order to protect keys more effectively, a novelwhite-box implementation for SM4 algorithm is proposed based on three-dimensional lookup table,called WIST in this paper. The SM4 block cipher algorithm is expressed in nonsingular matrix oflinear transformation;then the three-dimensional lookup table is designed to hide the key information,the input coding and output coding are used to confuse the lookup table. Meanwhile, the affine functionis adopted as external coding, the white-box implementation for SM4 algorithm is completed, and thecorrectness of this algorithm is also verified. The efficiency analysis on WIST algorithm shows thatit occupies moderate memory space and has high security. The security analysis on WIST algorithmshows that this scheme can resist BGE attack, MGH attack, side channel attack, linear attack anddifferential attack. This scheme can protect key information well in white-box attack environment.
作者 杨亚涛 董辉 张艳硕 马英杰 YANG Ya-Tao;DONG Hui;ZHANG Yan-Shuo;MA Ying-Jie(Department of Electronic and Communication Engineering,Beijing Electronic Science and Technology Institute,Beijing 100070,China;School of Telecommunication Engineering,Xidian University,Xi’an 710071,China)
出处 《密码学报(中英文)》 CSCD 北大核心 2024年第2期344-356,共13页 Journal of Cryptologic Research
基金 北京市自然科学基金(4232034) 中央高校基本科研业务费专项资金(328202222) “通信工程”、“电子信息工程”国家级一流本科专业建设点项目。
关键词 白盒密码 SM4算法 查找表 密钥混淆 密码攻击 white-box cryptography SM4 lookup table key confusion cryptography attack
  • 相关文献

参考文献10

二级参考文献24

  • 1Anderson R, Kuhn M. Low cost attacks on tamper-resistant devices. In: Proc. of the 5th Int'l Workshop on Security Protocols. LNCS 1361, Springer-Verlag, 1997. 125-136. [doi: 10.1007/BFb0028165].
  • 2Biham E, Shamir A. Differential fault analysis of secret key cryptosystems. In: Proc. of the 17th Annual Int'l Cryptology Conf. on Advances in Cryptology. New York, 1997. 513-525. [doi: 10.1007/BFb0052259].
  • 3Biham E, Shamir A. Power analysis of the key scheduling of the AES candidates. In: Proc. of the 2nd AES Candidate Conf. Rome, 1999. 22-23.
  • 4Chow S, Eisen P, Johnson H, Van Oorschot PC. White-Box cryptography and an AES implementation. In: Proc. of the Selected Areas in Cryptography. LNCS 2595, Newfoundland: Springer-Verlag, 2002.250-270. [doi: 10.1007/3-540-36492-7_17].
  • 5Chow S, Eisen P, Johnson H, Van Oorschot PC. A white-box DES implementation for DRM applications. In: Proc. of the ACM Workshop on Security and Privacy in Digital Rights Management. LNCS 2692, Heidelberg: Springer-Vedag, 2002. 1-15. Idol: 10.1007/978-3-540-44993-5_1].
  • 6Jacob M, Boneh D, Felten E. Attacking an obfuscated cipher by injecting faults. In: Proc. of the ACM Workshop on Security and Privacy in Digital Rights Management. LNCS 2696, Heidelberg: Springer-Verlag, 2002. 16-31. [doi: 10.1007/978-3-540-44993- 5_21.
  • 7Wyseur B, Michiels W, Gorissen P, Preneel B. Cryptanalysis of white-box DES implementations with arbitrary external encodings. In: Proc. of the Selected Areas in Cryptography. LNCS 4876, Ottawa: Springer-Verlag, 2007. 264-277. [doi: 10.1007/978-3-540- 77360-3_17].
  • 8Goubin L, Masereel JM, Quisquater M. Cryptanalysis of white box DES implementations. In: Proc. of the Selected Areas in Cryptography. LNCS 4876, Ottawa: Springer-Verlag, 2007.278-295. [doi: 10.1007/978-3-540-77360-3_18].
  • 9Billet.O, Gilbert.H, Ech-Chatbi C. Cryptanalysis of a white box AES implementation. In: Proc. of the Selected Areas in Cryptography. LNCS 3357, Berlin, Heidelberg: Springer-Verlag, 2005. 227-240. [doi: 10.1007/978-3-540-30564-4_16].
  • 10Michiels W, Gorissen P, Hollmann HDL. Cryptanalysis of a generic class of white-box implementations. In: Proc. of the Selected Areas in Cryptography. LNCS 5381, Berlin, Heidelberg: Springer-Verlag, 2009.414-428. [doi: 10.1007/978-3-642-04159-4_27].

共引文献42

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部