通信学报 ›› 2017, Vol. 38 ›› Issue (3): 65-72.doi: 10.11959/j.issn.1000-436x.2017066

• 学术论文 • 上一篇    下一篇

基于SM3的动态令牌的能量分析攻击方法

杜之波,吴震,王敏,饶金涛   

  1. 成都信息工程大学信息安全工程学院,四川 成都 610225
  • 修回日期:2017-01-16 出版日期:2017-03-01 发布日期:2017-04-13
  • 作者简介:杜之波(1982-),男,山东冠县人,成都信息工程大学讲师,主要研究方向为信息安全、侧信道攻击与防御、天线应用和物联网安全。|吴震(1975-),男,江苏苏州人,成都信息工程大学副教授,主要研究方向为信息安全、密码学、侧信道攻击与防御、信息安全设备设计与检测。|王敏(1977-),女,四川资阳人,成都信息工程大学讲师,主要研究方向为网络攻防、侧信道攻击与防御。|饶金涛(1985-),男,湖北黄冈人,成都信息工程大学助教,主要研究方向为信息安全、嵌入式系统安全、侧信道攻击与防御。
  • 基金资助:
    国家重大科技专项基金资助项目(2014ZX01032401-001);国家高技术研究发展计划(“863”计划)基金资助项目(2012AA01A403);“十二五”国家密码发展基金资助项目(MMJJ201101022);四川省科技计划基金资助项目(2017GZ0313);四川省教育厅科研基金资助项目(17ZB0082);成都信息工程大学科研人才基金资助项目(XAKYXM008);成都信息工程大学科研人才基金资助项目(XAKYXM009);成都信息工程大学科研人才基金资助项目(XAKYXM010);成都信息工程大学科研人才基金资助项目(XAKYXM011)

Power analysis attack of dynamic password token based on SM3

Zhi-bo DU,Zhen WU,Min WANG,Jin-tao RAO   

  1. College of Information Security Engineering,Chengdu University of Information Technology,Chengdu 610225,China
  • Revised:2017-01-16 Online:2017-03-01 Published:2017-04-13
  • Supported by:
    The National Science and Technology Major Project(2014ZX01032401-001);The National High Technology Research and Development Program (863 Program)(2012AA01A403);“The 12th Five-Years” National Cryptogram Development Fund(MMJJ201101022);Sichuan Province Science and Technology Program(2017GZ0313);Sichuan Provincial Education Department Scientific Research Projects(17ZB0082);The Scientific Research Talent Fund of CUIT(XAKYXM008);The Scientific Research Talent Fund of CUIT(XAKYXM009);The Scientific Research Talent Fund of CUIT(XAKYXM010);The Scientific Research Talent Fund of CUIT(XAKYXM011)

摘要:

提出一种针对基于 SM3 的动态令牌实施的能量分析攻击新方法,首次提出选择置换函数的输出作为能量分析攻击的目标,并将攻击结果联立得到方程组。根据给出的逆置换函数求解方程组,即可破解最终的密钥。通过实测攻击实验,验证了该攻击方法的有效性,这就很好地解决了直接选择密钥作为能量分析攻击目标所产生的问题,同时,引入中间变量作为能量分析攻击目标破解密钥方法,还可以应用于针对其他密码算法的能量分析攻击中。

关键词: 动态令牌, SM3算法, 能量分析攻击, 置换函数的输出, 逆置换函数

Abstract:

A novel method of the power analysis attack of dynamic password token based on SM3 was first proposed to choose the permutation function output as the power analysis attack target,and the simultaneous equations about the key were composed of the attack results.According to the given inverse permutation function,the key was derived by solving the simultaneous equations based on the inverse permutation function.Measured results are presented to validate the proposed method was effective.The proposed method solved the problems of permutation function keys for direct selection of target as an energy analysis attack target.And the proposed method can also be applied to the power analysis attack of the other cryptographic algorithms.

Key words: dynamic password token, SM3 algorithm, power analysis attack, permutation function output

中图分类号: 

No Suggested Reading articles found!