期刊文献+

SMS4算法安全性研究 被引量:3

A Research on the Security of SMS4 Algorithm
下载PDF
导出
摘要 在基于汉明重量的简单能量泄露模型下,我们发现SMS4算法中某些操作会泄露出密钥信息,从而容易受到差分能量分析攻击。通过分析与实验我们证明了该攻击的可行性。随后提出两种对SMS4算法的改进,使其能抵御差分能量分析攻击,由此增强SMS4算法的安全性。 Under a simple power leakage model based on Hamming weight, we find some operation in SMS4 algorithm will leaks information about secret key which is vulnerable to differential Power Analysis attack. The attacks described are proven to be sound by using math analytical method and experiment. We propose two methods to modify the SMS4 algorithm in order to resistant against DPA and enhance the security of SMS4.
出处 《北京电子科技学院学报》 2008年第4期14-18,13,共6页 Journal of Beijing Electronic Science And Technology Institute
关键词 简单能量泄露模型 SMS4 差分能量分析攻击 simple power leakage model SMS4 differential Power Analysis attack
  • 相关文献

参考文献6

  • 1J.Kelsey,B.Schneier,D.Wagner,et al."Side Channel Cryptanalysis of Product Ciphers".0Proceedings of ESORICS'98,Springer-Verlag,pp.97-110,1998.
  • 2Paul Kocher,Joshua Jaffe,and Benjamin Jun," Differential Power Analysis" in proceedings of Advances in Cryptology-CRYPTO 99,Springer-Verlag,pp.388-397,1999.
  • 3国家商用密码管理办公室.无线局域网产品使用的SMS4密码算法.北京,2006.
  • 4Thomas S.Messerges," Using Second-Order Power Analysis to Attack DPA Resistant to DPA",CHES 2000,pp.238-251,2000.
  • 5YongBin Zhou,DengGuo Feng "Side-Channel Attacks:Ten Years After Its Publication and Impacts on Cryptographic Module Security Testing",the Physical Security Testing Workshop,2005.
  • 6郑秀林,李敏.SMS4算法的一种改进[J].北京电子科技学院学报,2007,15(4):16-18. 被引量:4

共引文献3

同被引文献28

  • 1国家商用密码管理办公室.无线局域网产品使用的SMS4密码算法[EB/OL].http//:www.oscca.gov.en/up-File 200621016423197990.pdf,2006.
  • 2Stefan Mangard, Elisabeth Oswald, Thomas Popp.能量分析攻击[M].冯登国,周永斌,刘继业,等译.北京:科学出版社,2010:100-109.
  • 3李超,孙兵,李瑞林.分组密码的攻击方法与实例分析[M].北京:科学出版社,2010.
  • 4Thomas. S. Messerges. Securing the AES Finalists Against Power Analysis Attacks[J ]. In Proceedings of Fast Software Encryption Workshop, Lecture Notes in Computer Science, 2001, 1978: 298- 301.
  • 5Manfred Aigner, Elisabeth Oswald. Power Analysis Tutorial[ D]. Institute for Applied Information Processing and Communication University of Technology Graz Inffeldgasse 16a, A-8010 Graz, Austria, 1999.
  • 6Wvan Eck. Electromagnetic Radiation from Video display Units:An Eves dropping Risk[ J ]. Computers and Se- curity, 1985,4 : 269 - 286.
  • 7Kocher P C. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems[C]. Ad- vances in Cryptology CRYPTO'96. Springer Berlin Heidelberg, 1996:104 - 113.
  • 8Bar-E1 H, Choukri H, Naccache D, et al. The sorcerer's apprentice guide to fault attacks[J]. Proceedings of the IEEE, 2006, 94(2): 370-382.
  • 9Kocher P, Jaffe J, Jun B. Differential power analysis[ C]. Advances in Cryptology " CRYPTO'99. Springer Berlin Heidelberg, 1999 : 388 - 397.
  • 10Eric Brier, Christophe Clavier, Francis Olivier. Correlation Power Analysis with a Leakage Model [C]. CHES2004, LNCS3156,2004 : 16 - 19.

引证文献3

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部