期刊文献+

抗简单功耗攻击的SM2原子算法 被引量:4

Atomic Algorithm Against Simple Power Attack of SM2
下载PDF
导出
摘要 SM2算法是中国国家密码管理局颁布的商用椭圆曲线公钥密码标准算法.传统密码算法通常存在安全漏洞,攻击者往往针对算法中的安全薄弱环节展开攻击,分析提取密钥,对密码系统和人们的财产安全构成很大威胁.功耗攻击是最常见的攻击方式,它具有较小密钥搜索空间及较高分析效率等诸多优点.功耗攻击利用密码算法运行过程中的功耗泄漏,采集功耗曲线分析恢复得到密钥.为有效抵抗功耗攻击,提高SM2算法安全性,参考国际椭圆曲线密码算法,将原子概念运用到SM2中,提出一种新型结构的原子算法.经理论分析,在运算量方面相比基本算法降低了27.4%,并且均低于已有的原子算法.经由SAKURA-G FPGA仿真验证结果表明,能够成功抵抗简单功耗攻击. SM2algorithms are commercial elliptic curve public-key algorithms,which are released by Chinese Cryptography Administration and similar to ECC.Traditional cryptographic algorithms always have security flaws.Attackers often attack on security weaknesses of algorithms and analyze the secret-key,which poses great threat to cryptographic systems and peoples'property.There are various kinds of attacks,such as power attack,fault attack and electromagnetic attack.Among these attacks,power attack is the most traditional one,which has many advantages such as small secret-key searching space and high analysis efficiency.Usually,power attack utilizes the power leakage during operation processes of cryptographic algorithms,acquires power waves and retrieves the secret key.In order to resist power attack and enhance the security of SM2 algorithms,this article learns from elliptic curve cryptography algorithms,applies the atomic concept into SM2 and proposes a novel atomic algorithm.According to theoretical comparison between the proposed algorithm and other former algorithms,it shows that the proposed algorithm saves 27.4% of computation in comparison to double-and-add always algorithm.Besides,it has less computation amount than other atomic algorithms.Furthermore,implementation has been fulfilled on SAKURA-G FPGA board.Simulation results demonstrate that the proposed algorithm can resist simple power attack successfully.
出处 《计算机研究与发展》 EI CSCD 北大核心 2016年第8期1850-1856,共7页 Journal of Computer Research and Development
基金 "核高基"国家科技重大专项基金项目(2014ZX01032205 2014ZX01032401-001-Z05) 国家自然科学基金项目(61402252 61402536) 信息保障技术重点实验室开放基金项目(KJ-14-006) 北京理工大学青年教师学术启动计划项目~~
关键词 SM2算法 密码系统 功耗攻击 椭圆曲线密码算法 原子算法 SM2 cryptographic system power attack elliptic curve cryptographic algorithm atomic algorithm
  • 相关文献

参考文献2

二级参考文献22

  • 1石润华,钟诚.一种快速的椭圆曲线标量乘方法[J].计算机工程与应用,2006,42(2):156-158. 被引量:9
  • 2KOBLITZ N. Elliptic curve cryptosystems [ J]. Mathematics of Computation, 1987, 48(177) : 203 -209.
  • 3MILLER V S. Use of elliptic curves in cryptography [ C]//CRYP- TO 1985, LNCS 218. Berlin: Springer-Verlag, 1986:417-426.
  • 4KOCHER P C. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems [ C]// CRYPTO 1996: Proceedings of the 16th Annum International Cryptology Conference on Advances in Cryptology, LNCS 1109. Berlin: Springer-Verlag, 1996: 104-113.
  • 5KOCHER P C, JAFFE J, JUN B. Differential power analysis [ C]// CRYPTO 1999, LNCS 1666. Berlin: Springer-Verlag, 1999:388 - 397.
  • 6MOLLER B. Securing elliptic curve point multiplication against sidechannel attacks [ C]//ISC 2001: Information Security, LNCS 2200. Berlin: Springer-Verlag, 2001:324 - 334.
  • 7CORON J-S. Resistance against differential power analysis for elliptic curve cryptosystems [ C]//CHES 1999: Cryptographie Hardware and Embedded Systems, LNCS 1717. Berlin: Springer-Verlag, 1999:292-302.
  • 8CHEVALLIER-MAMER B, CIET M, JOYE M. Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity [ J]. IEEE Transactions on Computers, 2004, 53(6) : 760 - 768.
  • 9MORAIN F, OLIVOS J. Speeding up the computations on an elliptic curve using addition-sub-traction chains [ J]. Theoretical Informaties and Applications, 1990, 24(6): 513-544.
  • 10MISHRA P K. Pipelined computation of scalar multiplication in elliptic curve cryptosystems [ C]// CHES 2004: Cryptographic Hardware and Embedded Systems, LNCS 3156. Berlin: Springer-Verlag, 2004:328-342.

共引文献1

同被引文献13

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部