Plaintext selection related collision attack method based on mask SM4 cryptographic algorithm

A technology of choosing plaintext and collision attack, which is applied to the usage of multiple keys/algorithms, countermeasures for attacking encryption mechanisms, encryption devices with shift registers/memory, etc. It can solve the problems that collision attacks are difficult to work, and achieve effective attacks Effect

Pending Publication Date: 2020-04-17
成都三零嘉微电子有限公司
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Collision attacks are only effective for unprotected cryptographic algorithms. When the cryptographic algorithm is added with mask protection measures, collision attacks are difficult to work

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Plaintext selection related collision attack method based on mask SM4 cryptographic algorithm
  • Plaintext selection related collision attack method based on mask SM4 cryptographic algorithm
  • Plaintext selection related collision attack method based on mask SM4 cryptographic algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The present invention will be further described below in conjunction with the accompanying drawings.

[0063] Such as image 3 As shown, a chosen plaintext correlation collision attack method based on the masked SM4 cipher algorithm includes the following content.

[0064] 1. Measurement stage

[0065] In the measurement phase, the attacker chooses to enter the plaintext of the SM4 cryptographic algorithm, encrypts the cryptographic device to be attacked, and records and collects the corresponding energy traces for use in the collision detection phase.

[0066] Let SM4 password algorithm input plaintext be in (i=0,1,2,3); the round key of the first round is Choose input plaintext, fixed x i0 = 0, and let x i1 =x i2 =x i3 , its value is traversed from 0 to 255 in turn, each value is encrypted for N times, and the corresponding N energy traces are recorded and collected. Each energy trace contains T sampling points, which is recorded as Where 0≤n≤N-1, 0≤α≤255...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of side channel attacks, and discloses a plaintext selection related collision attack method based on a mask SM4 cryptographic algorithm. The method comprises a measurement stage and a collision detection stage; in the measurement stage, an attacker performs encryption operation on cryptographic equipment by selecting an input plaintext, records and collects a corresponding energy trace for use in the collision detection stage; in the collision detection stage, the attacker performs correlation calculation according to the collected energy traces and based onthe energy traces corresponding to the two collision bytes, so that the input difference of the collision bytes is determined; four round secret keys are obtained after obtaining the input differenceamong the four bytes, namely the round secret key information of the first round; and then the attack method is repeatedly performed, and round keys of the second round, the third round and the fourth round are sequentially solved; and finally an original 128-bit key is reversely deduced through a key expansion algorithm. According to the method, the encryption frequency required by collision isreduced, and the algorithm attack on the mask SM4 is realized.

Description

technical field [0001] The invention relates to the field of side channel attacks, in particular to a selected plaintext correlation collision attack method based on a masked SM4 cipher algorithm. Background technique [0002] (1) Masking scheme based on SM4 cryptographic algorithm [0003] The SM4 cipher algorithm is a block cipher standard adopted by the Chinese government. The algorithm is a grouping algorithm with a group length of 128 bits and a key length of 128 bits. Both the encryption algorithm and the key expansion algorithm adopt a 32-round nonlinear iterative structure. The structure of the decryption algorithm is the same as that of the encryption algorithm, except that the order in which the round keys are used is reversed, and the decryption round key is the reverse order of the encryption round key. [0004] The SM4 algorithm encryption process is attached figure 1 shown. Let the plaintext input be X 0 , X 1 , X 2 , X 3 , the round key is i=0, 1, 2...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/14H04L9/06H04L9/00
CPCH04L9/14H04L9/0631H04L9/003H04L9/002
Inventor 陈大钊何卫国李军饶金涛
Owner 成都三零嘉微电子有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products