Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method of cracking sm4 algorithm

An algorithm and computing time technology, applied in the field of information cracking, can solve problems such as energy analysis failure, and achieve the effect of reducing the difficulty of cracking and reducing the time cost

Active Publication Date: 2019-04-12
TSINGHUA UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The function of the mask is to cover up the statistical characteristics of the middle value of the S box, thus invalidating the energy analysis based on the Hamming weight and Hamming distance model

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of cracking sm4 algorithm
  • A method of cracking sm4 algorithm
  • A method of cracking sm4 algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The implementation of the present invention will be described in detail below in conjunction with the accompanying drawings and examples, so as to fully understand and implement the process of how to apply technical means to solve technical problems and achieve technical effects in the present invention. It should be noted that, as long as there is no conflict, each embodiment and each feature in each embodiment of the present invention can be combined with each other, and the formed technical solutions are all within the protection scope of the present invention.

[0057] Such as image 3 Shown is a flow chart of a method according to an embodiment of the present invention, Figure 4 It is an algorithm flow chart of fault analysis after determining a fault clock according to an embodiment of the present invention, Figure 5 It is a schematic diagram of the first round of S-box attack scheme according to an embodiment of the present invention, the following reference ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an implementation method for breaking an SM4 algorithm. The method comprises the steps of generating a plurality of plaintexts and encrypting each plaintext via a composite field S box with a mask measure; using a fault clock to successively attack the first output of each S single box of the S box during the encrypting process of each plaintext, and thus obtaining the plaintext corresponding to the zero input of each single box of the S box; and backstepping according to the plaintext corresponding to the zero input of each single box to acquire an S box encrypted key. The method can break the encrypted key of the SM4 algorithm.

Description

technical field [0001] The invention belongs to the technical field of information deciphering, and in particular relates to a method for deciphering the SM4 algorithm. Background technique [0002] As an important cryptographic algorithm carrier, smart cards are widely used in people's daily life. The attack technology research on cryptographic chips mainly includes intrusive attack technology, semi-intrusive attack technology and non-intrusive attack technology. Among them, the non-intrusive attack technology has become the most popular technology nowadays because of its simple implementation, low cost and no damage to the chip. The main threat to cryptographic chips. Fault attack is a commonly used non-intrusive attack technology, which uses a cryptographic chip to suddenly change the working environment of the chip (such as frequency or voltage) during the operation process, resulting in an error in the encryption operation and obtaining the wrong ciphertext. The diffe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L9/08
CPCH04L9/0618H04L9/0861
Inventor 乌力吉雷潜张向民潘立阳
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products