期刊文献+

针对SM4算法的功耗模板-碰撞分析

Power Template-Collision Analysis Based on SM4 Algorithm
下载PDF
导出
摘要 分析发现在非平衡Feistel结构的SM4算法中,前后轮次的中间数据具有相关性。因此,通过内部碰撞原理并结合模板匹配的方法后,可用于恢复SM4算法轮子密钥,并给出了一种针对SM4算法的功耗模板-碰撞分析的侧信道方法。分析时选择特殊的明文采集功耗曲线,将算法加密过程中非平衡Feistel结构的右半部分的中间变量值(如S盒输出值)作为分析目标,利用每一轮各中间变量值碰撞来恢复轮子密钥。实验验证证明,在未加掩码情况下,大约采用2 500条功耗曲线(模板曲线除外),可有效实施分析。相比于传统碰撞分析方法,该方法降低了计算复杂度,将碰撞分析方法扩展到非平衡Feistel算法结构,提高并增强了碰撞分析方法的适用性与实用性。 It is found that in the SM4 algorithm of unbalanced Feistel network,the intermediate data from previous and subsequent rounds are relevant.Therefore,the round keys of the SM4 algorithm can be restored through the internal collision principle and the template matching method.And a side channel method of power template-collision analysis based on SM4 algorithm is given.A special set of plaintext is selected to collect the power consumption traces to analyze.And during the algorithm encryption process,the intermediate data(such as the output value of the S-box)in the right half of the unbalanced Feistel network is used as the analysis target.The round keys can be restored by using each round of the S-box output values collision.Experiments prove that approximately 2,500 power consumption traces without masking(except the template traces)are used,which can effectively implement analysis.Compared with the traditional collision analysis,the analysis reduces computational complexity,and extends collision analysis to the unbalanced Feistel network,which improves and enhances the applicability and practicability of collision analysis.
作者 徐家俊 张翌维 赵建 相韶华 XU Jiajun;ZHANG Yiwei;ZHAO Jian;XIANG Shaohua(College of Big Data and Internet,Shenzhen Technology University,Shenzhen,Guangdong 518118,China)
出处 《计算机工程与应用》 CSCD 北大核心 2021年第11期111-118,共8页 Computer Engineering and Applications
基金 深圳技术大学新引进高端人才财政补助科研启动项目(2018010801008) 深圳技术大学校企合作项目(202029555401048,2019106401005)。
关键词 碰撞分析 SM4算法 非平衡Feistel结构 模板匹配 collision analysis SM4 algorithm unbalanced Feistel network template matching
  • 相关文献

参考文献5

二级参考文献45

  • 1张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602. 被引量:67
  • 2国家商用密码管理办公室.无线局域网产品使用的SMS4密码算法[EB/OL].http//:www.oscca.gov.en/up-File 200621016423197990.pdf,2006.
  • 3李超,孙兵,李瑞林.分组密码的攻击方法与实例分析[M].北京:科学出版社,2010.
  • 4Ferguson N, Schneier B, Kohno T. Cryptography Engineering: Design Principles and Practical Applications. Hoboken: Wiley, 2010.
  • 5Menezes A J, van Oorschot P C, Vanstone S A. Handbook of Applied Cryptography. CRC Press, 1997.
  • 6Kocher P, Jaffe J, Jun B. Differential power analysis. In: Proceedings of 19th International Conference on Cryptology, Santa Barbara, 1999. 388--397.
  • 7Schramm K, Wollinger T, Paar C. A new class of collision attacks and its application to DES. In: Proceedings of 10th International Workshop on Fast Software Encryption, Lund, 2003. 206-222.
  • 8Schramm K, Leander G, Felke P, et al. A collision-attack on AES combining side channel- and differential-attack. In: Proceedings of 6th Workshop on Cryptographic Hardware and Embedded Systems, Cambridge, 2004. 163-175.
  • 9Bogdanov A. Improved side-channel collision attacks on AES. In: Proceedings of 14th International Workshop on Selected Areas in Cryptography, Ottawa, 2007. 84-95.
  • 10Bogdanov A. Multiple-differential side-channel collision attacks on AES. In: Proceedings of 10th Workshop on Cryp- tographic Hardware and Embedded Systems, Washington, 2008. 30-44.

共引文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部