Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Second-Order Side Channel Energy Analysis Method for SM4 Cipher Algorithm

An energy analysis and cryptographic algorithm technology, applied in the direction of encryption device with shift register/memory, etc., can solve the problem of second-order energy analysis without systematic analysis method, etc., and achieve the effect of strong practicability

Active Publication Date: 2017-02-15
国家密码管理局商用密码检测中心
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is no systematic analysis method for the second-order energy analysis of masks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Second-Order Side Channel Energy Analysis Method for SM4 Cipher Algorithm
  • A Second-Order Side Channel Energy Analysis Method for SM4 Cipher Algorithm
  • A Second-Order Side Channel Energy Analysis Method for SM4 Cipher Algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The technical solution of the present invention is described in detail below. First, the SM4 cryptographic algorithm with the same input and output middle mask value of the S box is used for CPA analysis to illustrate the technical solution of the present invention. A typical implementation of the first-order mask defense method of the SM4 algorithm is as follows: image 3 As shown, both the input value S_in and the output value S_out of the S box are XORed with the mask value m=(m 0 , m 1 , m 2 , m 3 ). The newly constructed S′ box is j is sequentially 0, 1, 2, 3, x j Indicates the j-th byte in 32-bit x. For the first-order mask defense method of the SM4 algorithm, XOR the input and output of the S-box to eliminate the mask:

[0057] Among them, j is 0, 1, 2, 3 in sequence

[0058]

[0059] Therefore, the XOR S_InXorOut of the input and output of the S-box is used as the attack point, and the second-order side channel energy analysis is performed. The s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a second order side channel energy analysis method for an SM4 cipher algorithm. The method comprises the following steps: (1) collecting energy trace and establishing a sampling energy consumption matrix; (2) performing preprocessing on the measured energy consumption matrix in the above step; (3) choosing XOR S_InXorOutj of input / output of an S box to serve as an attack point, performing CPA or DPA analysis and obtaining correct round secret key byte rki,j; (4) repeating the step (2) and the step (3) to respectively obtain other secret key bytes of the round secret key and obtaining correct round secret keys; and (5) carrying out step (2) (3) and (4) on the front four rounds and back four rounds to obtain four round secret keys and obtaining an initial secret key through secret key reverse expansion. In the technical scheme, the new second order energy analysis method is provided innovatively, new situation of SM4 cipher algorithm attack is developed, side channel energy analysis means for the SM4 cipher algorithm is extended, and the side channel energy analysis for the SM4 cipher algorithm can be carried out more comprehensively and effectively. The method is targeted for the common mask protection measures and is high in practicality.

Description

technical field [0001] The invention belongs to the technical field of cryptographic algorithm analysis and detection, and specifically aims at realizing the second-order side channel energy analysis for the SM4 cryptographic algorithm with mask protection measures, and particularly relates to the secondary SM4 cryptographic algorithm with the same input and output middle mask of the S box. The first-order side channel energy analysis method. Background technique [0002] With the development of information technology, various cryptographic algorithms are being widely used in economic, military, administrative and other important departments to protect the security of information. In view of the importance of cryptographic algorithms, the analysis and research of cryptographic algorithm software and hardware implementation (cryptographic modules) is of great significance to protect information security. In recent years, several attacks on cryptographic modules have become k...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06
Inventor 李大为罗鹏曹伟琼
Owner 国家密码管理局商用密码检测中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products