WANG Kai,WU Zheng,DU Zhibo,et al.Analysis of the First Four Rounds of Reduction Wheel Fault Injection in SM4 Algorithm[J].Journal of Chengdu University of Information Technology,2019,(05):457-461.[doi:10.16836/j.cnki.jcuit.2019.05.002]
SM4算法前四轮约减轮故障注入分析
- Title:
- Analysis of the First Four Rounds of Reduction Wheel Fault Injection in SM4 Algorithm
- 文章编号:
- 2096-1618(2019)05-0457-05
- Keywords:
- information security; hardware security; SM4 cryptographic algorithm; fault injection; block cipher; reduction wheel failure
- 分类号:
- TP915.08
- 文献标志码:
- A
- 摘要:
- 针对SM4密码算法,提出一种新型的约减轮故障攻击方法,故障注入于加密算法的前4轮中,使加密算法的后续迭代轮数减少,对故障数据进行筛选和分析,理论上由4个错误密文就可以恢复128 bit的初始密钥,从而完成攻击。方法对比现有针对SM4 的差分故障攻击方法有很大的简化,提高了攻击效率。利用攻击方法对无防护SM4 算法的智能卡进行了约减轮故障注入攻击,实验结果表明攻击方法行之有效,也可以扩展到其他分组密码。
- Abstract:
- A new method of round-trip fault attack is proposed.For the SM4 cryptographic algorithm,the fault is injected into the first 4 rounds of the encryption algorithm,so that the number of subsequent iterations of the encryption algorithm is reduced.Compared with the existing differential fault attack method for SM4,this method greatly and the attack efficiency.The experimental results show that the attack method is effective.This method can also be extended to other block ciphers.
参考文献/References:
[1] 全国信息安全标准化技术委员会.GB/T 32907-2016信息安全技术SM4分组密码算法[S].北京:中国质检出版社,2016.
[2] 国家商用密码管理办公室.无线局域网产品使用的SMS4密码算法[EB/OL].http://www.oscca.gov.cn/upfile/200621016423197990.pdf,2006.
[3] Dan B,Richard A,Demillo R,et al.On the importance of checking cryptographic protocols for faults[C].1997:1175-1213.
[4] Kocher P C.Timing attacks on implementations ofDiffie-Hellman,RSA,DSS,and other systems[C].In:Advances in Cryptology-CRYPTO 1996.Springer Berlin Heidelberg,1996:104-113.
[5] Johannes,Jean P S.Fault based cryptanalysis of the advanced encryption standard(AES)[M].Springer Berlin Heidelberg,2002:162-181.
[6] Piret G,Quisquater J J.A differential fault attack technique againstspn structures,with application to the AES and khazad[C].Cryptographic Hardware and Embedded Systems-CHES 2003,International workshop,2003:77-88.
[7] 张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602.
[8] 李玮,谷大武.基于密钥编排故障的SMS4算法的差分故障分析[J].通信学报,2008,29(10):135-142.
[9] Li R L,Sun B,Li C,et al.Differential fault analysis on SMS4 using a single fault[J].Information Processing Letters,2011,111(4):156-163.
[10] 荣雪芳,吴震,王敏,等.基于随机故障注入的SM4差分故障攻击方法[J].计算机工程,2016,42(7):129-133.
[11] Li W,Gu D.An improved method of differential fault analysis on the SMS4 cryptosystem[C].International Symposium on Data Privacy and E-commerce,2007:175-180.
[12] Ross A,Markus K.Low cost attacks on tamper resistant devices[C].Springer,1997:125-136.
[13] Hamid C,Michael T.Round reduction using faults[J].FDTC,2005,5:13-24.
相似文献/References:
[1]廖 煊,刘 苗,李金珂.基于改进RPS技术的IPSEC VPN网关设计[J].成都信息工程大学学报,2020,35(05):542.[doi:10.16836/j.cnki.jcuit.2020.05.011]
LIAO Xuan,LIU Miao,LI Jinke.Design of IPSEC VPN Gateway based on Improved RPS Technology[J].Journal of Chengdu University of Information Technology,2020,35(05):542.[doi:10.16836/j.cnki.jcuit.2020.05.011]
备注/Memo
收稿日期:2019-03-27基金项目:国家重点研发计划资助项目(2018YFB0904900,2018YFB0904901); 国家科技重大专项基金资助项目(2014ZX01032401); “十三五”国家密码发展基金资助项目(MMJJ20180244); 四川省教育厅重点科研基金资助项目(17ZB0082); 四川省重点研发资助项目(2019YFG0096)