通信学报 ›› 2015, Vol. 36 ›› Issue (10): 85-91.doi: 10.11959/j.issn.1000-436x.2015270

• 学术论文 • 上一篇    下一篇

针对SM4轮输出的改进型选择明文功耗分析攻击

杜之波,吴震,王敏,饶金涛   

  1. 成都信息工程大学 信息安全工程学院,四川 成都 610225
  • 出版日期:2015-10-25 发布日期:2015-10-27
  • 基金资助:
    国家重大科技专项基金资助项目;国家高技术研究发展计划(“863”计划)基金资助项目;“十二五”国家密码发展基金资助项目;四川省科技支撑计划基金资助项目;四川省教育厅重点科研基金资助项目;成都信息工程学院科研基金资助项目

Improved chosen-plaintext power analysis attack against SM4 at the round-output

Zhi-bo DU,Zhen WU,Min WANG,Jin-tao RAO   

  1. College of Information Security Engineering,Chengdu University of Information Technology,Chengdu 610225,China
  • Online:2015-10-25 Published:2015-10-27
  • Supported by:
    The National Science and Technology Major Project;The National High Technology Research and Development Program of China(863 Program);“The 12th FIVE-YEARS”National Cryptogram Development Fund;Sichuan Science and Technology Support Programmer;The Education De-partment Key Scientific Research Projects of Sichuan Province;Project Supported by the Scientific Research Founda-tion of CUIT

摘要:

Wang等通过攻击时引入固定数据,在2013年的CIS上提出了针对SM4密码算法选择明文功耗分析攻击,但该方法存在选择明文次数、采集功耗信号曲线次数和条数多的问题,攻击过程复杂。分析发现该固定数据和轮子密钥之间的相关性可用于恢复轮子密钥,为此提出针对 SM4 密码算法轮输出的改进型选择明文功耗分析攻击。攻击时选择特殊的明文采集功耗信号曲线,将固定数据作为攻击目标,利用攻击出的固定数据来破解轮子密钥,实验验证了该方法的有效性。使用此方法进行攻击,不仅可以降低选择明文次数、采集功耗信号曲线次数和条数,提高攻击效率,而且还可应用于针对SM4密码算法线性变换的选择明文攻击。

关键词: SM4算法, 能量分析攻击, 选择明文, 轮输出, 固定数据

Abstract:

The power analysis attack on SM4 using the chosen-plaintext method was proposed by Wang et al in 2013 CIS.The fixed data was introduced in the method when attacking the round key.However,the attack process was complex.There were many problems in the process,such as more power traces,more numbers of the chosen-plaintext and acquisition power traces.The correlation between the fixed data and the round key were presented,which could be used to decode the round key.Based on the correlation,the improved chosen-plaintext power analysis attack against SM4 at the round-output was proposed.The proposed method attacked the fixed data by analyzing the power traces of the special plaintext.And the round key was derived based on the correlation.The results show that the proposed attack algorithm is effective.The proposed method not only improves the efficiency of the attack by reducing number of power traces,number of the chosen-plaintext and number of acquisition power traces,but also can be applied to a chosen-plaintext power analysis attack against SM4 at the shift operation.

Key words: SM4 algorithm, power analysis attack, chosen-plaintext, round output, fixed data

No Suggested Reading articles found!