摘要
分析了SMS4分组密码算法结构以及SMS4算法对差分故障攻击的安全性。攻击方式采用对算法的第32轮加密过程导入随机故障,结合差分分析技术,得到此轮的字密钥。攻击结果显示了SMS4密码算法对于差分故障攻击是脆弱的,只有对有关设备进行物理保护,防止可能进行的诱导错误,才能尽可能地减少SMS4被差分故障攻击的可能性。
SMS4 algorithm structure and a block cipher is analyzed SMS4 algorithm for the safety of the differential fault attack.Attacks using the algorithm of 32 rounds of encryption process import random failure,combined with the differential analysis technology,this round of key word.Attack results show the SMS4 cipher algorithm for differential fault attack is fragile,only on equipment for physical protection,to prevent possible induced errors,as much as possible to reduce the likelihood of SMS4 was differential fault attack.