KUANG Xiaoyun,HUANG Kaitian,LAN Tian,et al.Template Attack Against SM4 Cryptographic Algorithm[J].Journal of Chengdu University of Information Technology,2021,36(05):499-502.[doi:10.16836/j.cnki.jcuit.2021.05.004]
针对SM4密码算法的模板攻击
- Title:
- Template Attack Against SM4 Cryptographic Algorithm
- 文章编号:
- 2096-1618(2021)05-0499-04
- 分类号:
- TP309.1
- 文献标志码:
- A
- 摘要:
- 目前针对SM4密码算法的侧信道攻击研究主要是故障分析攻击和相关性能量分析攻击,为了探索模板攻击针对SM4密码算法分析攻击应用问题,提出了针对SM4密码算法的模板攻击方法,模板构建时,选择SM4密码算法的S盒输出作为能量分析攻击点,汉明重量作为能量分析模型,构建关于S盒输出的模板,模板匹配时,选择多条曲线的联合概率进行匹配,概率最大值对应的密钥即为攻击出的正确密钥。针对SM4密码算法智能卡实测实验,验证了该攻击方法的有效性。该攻击方法不仅可以应用到针对SM4密码算法其他攻击点的模板攻击,而且对其他分组密码算法的模板攻击具有借鉴意义。
- Abstract:
- At present, the research of the side channel attack against the SM4 cryptographic algorithm is mostly about the fault analysis attack and correlation power analysis attack. A method of the template attack against SM4 cryptographic algorithm was proposed to explore the application of the template attack against SM4 cryptographic algorithm. When constructing the template, the S-box output of the SM4 cryptographic algorithm was selected as the attack point. And Hamming weight model was selected as power analysis model. The template about S-box output was constructed during the template attack. The joint probability of multiple power traces was selected for template matching. The key corresponding to the maximum probability was the correct key. The effectiveness of this method is demonstrated by the experiment of the SM4 cryptographic algorithm smart card. The method can not only be applied to the other attack points of the SM4 cryptographic algorithm, but also be used for reference to other block cipher algorithms.
参考文献/References:
[1] Paul K, Joshua J,Benjamin J.Differential power analysis[A].Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology[C].1999:388-397.
[2] 杜之波, 孙元华, 王燚.针对AES密码算法的多点联合能量分析攻击[J].通信学报,2016,37(S1):78-84.
[3] Schramm K,Wollinger T J,Paar C.A new class of collision attacks and its application to DES[C].Fast Software Encryption-FSE 2003,LNCS2779,2003:2-16.
[4] 金雨璇,杨宏志,王相宾,等.对SM4算法的改进差分故障攻击[J].密码学报,2020,7(4):453-464.
[5] 荣雪芳,吴震,王敏,等.基于随机故障注入的SM4差分故障攻击方法[J].计算机工程,2016(7).
[6] 杜之波,吴震,王敏,等.针对SM4密码算法的多点联合能量分析攻击[J].计算机研究与发展,2016,53(10):2224-2229.
[7] 杜之波,吴震,王敏,等.针对SM4轮输出的改进型选择明文功耗分析攻击[J].通信学报,2015,36(10):85-91.
[8] 王敏,饶金涛,吴震,等.SM4密码算法的频域能量分析攻击[J].信息网络安全,2015(8):14-19.
[9] 马向亮,李冰,杨丹,等.基于深度学习的类SM4算法S盒逆向分析[J/OL].北京邮电大学学报:https://doi.org/10.13190/j.jbupt.2020-034,[2020-12-31]:1-7.
[10] Office of State Commercial Cipher Administration. Block cipher for WLAN products-SMS4 [EB/OL].http://www.oscca.go- v.cn/UpFile/200621016423197990.pdf,2006-02-10.
相似文献/References:
[1]万武南,陈 俊.针对Montgomery模幂算法的选择明文SPA攻击[J].成都信息工程大学学报,2016,(04):348.
WAN Wu-nan,CHEN Jun.A Simple Power Analysis Attack on the Montgomery
Modular Exponentiation Algorithms[J].Journal of Chengdu University of Information Technology,2016,(05):348.
[2]万武南,陈 俊.针对双重掩码模幂算法的二阶互相关功耗分析攻击[J].成都信息工程大学学报,2016,(04):353.
WAN Wu-nan,CHEN Jun.A Second Order Cross Correlation Power Analysis Attack on
Double Blinding Exponentiation Algorithms[J].Journal of Chengdu University of Information Technology,2016,(05):353.
[3]黄 洁,王 燚.适用于侧信道分析的卷积神经网络结构的实验研究[J].成都信息工程大学学报,2019,(05):449.[doi:10.16836/j.cnki.jcuit.2019.05.001]
HUANG Jie,WANG Yi.Experimental Study on the Structure of Convolutional Neural Network Suitable for Side Channel Analysis[J].Journal of Chengdu University of Information Technology,2019,(05):449.[doi:10.16836/j.cnki.jcuit.2019.05.001]
[4]曹家华,吴 震,王 燚,等.基于CNN-BPR的S-Box功耗随机化侧信道攻击[J].成都信息工程大学学报,2022,37(01):16.[doi:10.16836/j.cnki.jcuit.2022.01.003]
CAO Jiahua,WU Zhen,WANG Yi,et al.Side Channel Attack of S-box Power Randomization based on CNN-BPR[J].Journal of Chengdu University of Information Technology,2022,37(05):16.[doi:10.16836/j.cnki.jcuit.2022.01.003]
备注/Memo
收稿日期:2021-01-14
基金项目:国家重点研发计划资助项目(2018YFB0904900、2018YFB0904901); “十三五”国家密码发展基金资助项目(MMJJ20180224); 四川省重点研发资助项目(2019YFG0096)