浏览全部资源
扫码关注微信
成都信息工程大学 信息安全工程学院,四川 成都 610225
[ "杜之波(1982-),男,山东冠县人,成都信息工程大学讲师,主要研究方向为信息安全、侧信道攻击与防御、天线应用和物联网安全。" ]
[ "吴震(1975-),男,江苏苏州人,成都信息工程大学副教授,主要研究方向为信息安全、密码学、侧信道攻击与防御、信息安全设备设计与检测。" ]
[ "王敏(1977-),女,四川资阳人,成都信息工程大学讲师,主要研究方向为网络攻防、侧信道攻击与防御。" ]
[ "饶金涛(1985-),男,湖北黄冈人,成都信息工程大学助教,主要研究方向为信息安全、嵌入式系统安全、侧信道攻击与防御。" ]
网络出版日期:2015-10,
纸质出版日期:2015-10-25
移动端阅览
杜之波, 吴震, 王敏, 等. 针对SM4轮输出的改进型选择明文功耗分析攻击[J]. 通信学报, 2015,36(10):85-91.
Zhi-bo DU, Zhen WU, Min WANG, et al. Improved chosen-plaintext power analysis attack against SM4 at the round-output[J]. Journal on communications, 2015, 36(10): 85-91.
杜之波, 吴震, 王敏, 等. 针对SM4轮输出的改进型选择明文功耗分析攻击[J]. 通信学报, 2015,36(10):85-91. DOI: 10.11959/j.issn.1000-436x.2015270.
Zhi-bo DU, Zhen WU, Min WANG, et al. Improved chosen-plaintext power analysis attack against SM4 at the round-output[J]. Journal on communications, 2015, 36(10): 85-91. DOI: 10.11959/j.issn.1000-436x.2015270.
Wang等通过攻击时引入固定数据,在2013年的CIS上提出了针对SM4密码算法选择明文功耗分析攻击,但该方法存在选择明文次数、采集功耗信号曲线次数和条数多的问题,攻击过程复杂。分析发现该固定数据和轮子密钥之间的相关性可用于恢复轮子密钥,为此提出针对 SM4 密码算法轮输出的改进型选择明文功耗分析攻击。攻击时选择特殊的明文采集功耗信号曲线,将固定数据作为攻击目标,利用攻击出的固定数据来破解轮子密钥,实验验证了该方法的有效性。使用此方法进行攻击,不仅可以降低选择明文次数、采集功耗信号曲线次数和条数,提高攻击效率,而且还可应用于针对SM4密码算法线性变换的选择明文攻击。
The power analysis attack on SM4 using the chosen-plaintext method was proposed by Wang et al in 2013 CIS.The fixed data was introduced in the method when attacking the round key.However
the attack process was complex.There were many problems in the process
such as more power traces
more numbers of the chosen-plaintext and acquisition power traces.The correlation between the fixed data and the round key were presented
which could be used to decode the round key.Based on the correlation
the improved chosen-plaintext power analysis attack against SM4 at the round-output was proposed.The proposed method attacked the fixed data by analyzing the power traces of the special plaintext.And the round key was derived based on the correlation.The results show that the proposed attack algorithm is effective.The proposed method not only improves the efficiency of the attack by reducing number of power traces
number of the chosen-plaintext and number of acquisition power traces
but also can be applied to a chosen-plaintext power analysis attack against SM4 at the shift operation.
PAUL K , JOSHUA J , BENJAMIN J . Differential power analysis [A ] . Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology [C ] . 1999 . 388 - 397 .
ERIC B , CHRISTOPHE C , FRANCIS O . Correlation power analysis with a leakage model [A ] . Proceeding of 6th International Workshop Cambridge [C ] . MA,USA , 2004 . 16 - 29 .
CHEN A D , XU S , CHEN Y , et al . Collision-based chosen-message simple power clustering attack algorithm [J ] . China Communications , 2013 , 10 ( 5 ): 114 - 119 .
吴震 , 陈运 , 陈俊 , 等 . 真实硬件环境下幂剩余功耗轨迹指数信息提取 [J ] . 通信学报 , 2010 , 31 ( 2 ): 17 - 21 .
WU Z , CHEN Y , CHEN J , et al . Exponential information’s extraction from power traces of modulo exponentiation implemented on FPGA [J ] . Journal on Communications , 2010 , 31 ( 2 ): 17 - 21 .
国家商用密码管理办公室 . 无线局域网产品使用的 SMS4 密码算法 [EB/OL ] . http://www.oscca.gov.cn/UpFile/2006210164231979 90.pdf http://www.oscca.gov.cn/UpFile/2006210164231979 90.pdf , 2006 .
Office of State Commercial Cipher Administration . Block cipher for WLAN products-SMS4 [EB/OL ] . http://www.oscca.gov.cn/UpFile/2006210164231979 90.pdf http://www.oscca.gov.cn/UpFile/2006210164231979 90.pdf , 2006 .
沈薇 . SMS4 算法的能量分析攻击及其防御研究 [D ] . 西安:西安电子科技大学 , 2009 .
SHEN W . Investigation of Power Analysis Attacks and Its CounterMeasures on SMS4 Cipher Algorithm [D ] . Xi’an:Xidian University , 2009 .
BAI X F , XU Y H , GUO L . Securing SMS4 cipher against differential power analysis and its VLSI implementation [A ] . Proceedings of 11th IEEE International Conference on Communication Systems [C ] . 2008 . 167 - 172 .
徐艳华 . 抗攻击的 SMS4 密码算法集成电路设计研究 [D ] . 合肥:中国科技大学 , 2009 .
XU Y H . Research on Attacks Resistant SMS4 Cipher VLSI Design Technology [D ] . Hefei:University of Science and Technology of China , 2009 .
赵新杰 , 王韬 , 郑媛媛 . 针对SMS4密码算法的Cache计时攻击 [J ] . 通信学报 , 2010 , 31 ( 6 ): 89 - 97 .
ZHAO X J , WANG T , ZHENG Y Y . Cache timing attack on SMS4 [J ] . Journal on Communications , 2010 , 31 ( 6 ): 89 - 97 .
WANG S T , GU D W , LIU J R , et al . A power analysis on SMS4 using the chosen plaintext method [A ] . 2013 Ninth International Conference on Computational Intelligence and Security [C ] . Springer , 2013 . 748 - 752 .
SURESH C , JOSYULA R R , PANKAJ R . Template attacks [A ] . Proceedings of 4th International Workshop Redwood Shores [C ] . CA,USA , 2003 . 13 - 28 .
王敏 , 杜之波 , 吴震 , 等 . 针对 SMS4 轮输出的选择明文能量分析攻击 [J ] . 通信学报 , 2015 , 36 ( 1 ):2015016.
WANG M , DU Z B , WU Z , et al . Chosen-plaintext power analysis attack against SMS4 with the round-output as the intermediate data [J ] . Journal on Communications , 2015 , 36 ( 1 ):2015016.
BRIER E , CLAVIER C , OLIVIER F . Correlation power analysis with a leakage module [A ] . Proceedings of 6th International Workshop Cambridge [C ] . MA,USA , 2004 . 125 - 134 .
0
浏览量
1508
下载量
9
CSCD
关联资源
相关文章
相关作者
相关机构