浏览全部资源
扫码关注微信
成都信息工程大学信息安全工程学院,四川 成都 610225
[ "杜之波(1982-),男,山东冠县人,成都信息工程大学讲师,主要研究方向为信息安全、侧信道攻击与防御、天线应用和物联网安全。" ]
[ "吴震(1975-),男,江苏苏州人,成都信息工程大学副教授,主要研究方向为信息安全、密码学、侧信道攻击与防御、信息安全设备设计与检测。" ]
[ "王敏(1977-),女,四川资阳人,成都信息工程大学讲师,主要研究方向为网络攻防、侧信道攻击与防御。" ]
[ "饶金涛(1985-),男,湖北黄冈人,成都信息工程大学助教,主要研究方向为信息安全、嵌入式系统安全、侧信道攻击与防御。" ]
网络出版日期:2017-03,
纸质出版日期:2017-03-15
移动端阅览
杜之波, 吴震, 王敏, 等. 基于SM3的动态令牌的能量分析攻击方法[J]. 通信学报, 2017,38(3):65-72.
Zhi-bo DU, Zhen WU, Min WANG, et al. Power analysis attack of dynamic password token based on SM3[J]. Journal on communications, 2017, 38(3): 65-72.
杜之波, 吴震, 王敏, 等. 基于SM3的动态令牌的能量分析攻击方法[J]. 通信学报, 2017,38(3):65-72. DOI: 10.11959/j.issn.1000-436x.2017066.
Zhi-bo DU, Zhen WU, Min WANG, et al. Power analysis attack of dynamic password token based on SM3[J]. Journal on communications, 2017, 38(3): 65-72. DOI: 10.11959/j.issn.1000-436x.2017066.
提出一种针对基于 SM3 的动态令牌实施的能量分析攻击新方法,首次提出选择置换函数的输出作为能量分析攻击的目标,并将攻击结果联立得到方程组。根据给出的逆置换函数求解方程组,即可破解最终的密钥。通过实测攻击实验,验证了该攻击方法的有效性,这就很好地解决了直接选择密钥作为能量分析攻击目标所产生的问题,同时,引入中间变量作为能量分析攻击目标破解密钥方法,还可以应用于针对其他密码算法的能量分析攻击中。
A novel method of the power analysis attack of dynamic password token based on SM3 was first proposed to choose the permutation function output as the power analysis attack target,and the simultaneous equations about the key were composed of the attack results.According to the given inverse permutation function
the key was derived by solving the simultaneous equations based on the inverse permutation function.Measured results are presented to validate the proposed method was effective.The proposed method solved the problems of permutation function keys for direct selection of target as an energy analysis attack target.And the proposed method can also be applied to the power analysis attack of the other cryptographic algorithms.
KOCHER P C , . Timing attacks on implementations of Diffie-Hellman,RSA,DSS,and other systems [C ] // The 16th Annual International Cryptology Conference . Santa Barbara,United States , 1996 : 104 - 113 .
KOCHER P , JAFFE J , JUN B . Differential power analysis [C ] // The 19th Annual International Cryptology Conference Santa Barbara . 1999 : 388 - 397 .
JEAN-JACQUES Q . A new tool for non-intrusive analysis of smart cards based on electromagnetic emissions,the SEMA and DEMA methods.Presented at the rump session of EUROCRYPT 2000 [C ] // Rump Session . 2000 .
DAN B , RICHARD A D , RICHARD J L . On the importance of checking cryptographic protocols for faults [C ] // Springer . 1997 : 37 - 51 .
杜之波 , 吴震 , 王敏 , 等 . 针对基于 SM3 的 HMAC 的能量分析攻击方法 [J ] . 通信学报 , 2016 , 37 ( 5 ): 38 - 43 .
DU Z B , WU Z , WANG M , et al . Power analysis attack of HMAC based on SM3 [J ] . Journal on Communications , 2016 , 37 ( 5 ): 38 - 43 .
XIE J , SUN W , GU D , et al . Research on differential power analysis of HMAC-SM3 [C ] // 2015 International Conference on Computer Science and Intelligent Communication . 2015 : 103 - 106 .
GUO L , WANG L , LIU D , et al . A chosen-plaintext differential power analysis attack on HMAC-SM3 [C ] // The 11th International Conference on Computational Intelligence and Security . 2015 : 350 - 353 .
GUO L , WANG L , LI Q , et al . A first-order differential power analysis attack on HMAC-SM3 [C ] // The First International Conference on Information Science and Electronic Technology . 2015 : 94 - 97 .
GUO L , WANG L , LI Q , et al . Differential power analysis on dynamic password token based on SM3 algorithm,and countermeasures [C ] // The 11th International Conference on Computational Intelligence and Security . 2015 : 354 - 357 .
STEFAN M , ELISABETH O , THOMAS P . Power analysis attacks:revealing the secrets of smart cards [M ] . Springer Science & Business Media , 2008 .
杜之波 , 吴震 , 王敏 , 等 . 针对 SM4 轮输出的改进型选择明文功耗分析攻击 [J ] . 通信学报 , 2015 , 36 ( 10 ): 85 - 91 .
DU Z B , WU Z , WANG M , et al . Improved chosen-plaintext power analysis attack against SM4 at the round-output [J ] . Journal on Communications , 2015 , 36 ( 10 ): 85 - 91 .
王敏 , 杜之波 , 吴震 , 等 . 针对 SMS4 轮输出的选择明文能量分析攻击 [J ] . 通信学报 , 2015 , 36 ( 1 ):2015016.
WANG M , DU Z B , WU Z , et al . Chosen-plaintext power analysis attack against SMS4 with the round-output as the intermediate data [J ] .2015016. Journal on Communications , 2015 , 36 ( 1 ):
HYUNJIN A , NEIL H , MAIRE O , et al . An improved second-order power analysis attack based on a new refined expecter [C ] // Springer . 2015 : 174 - 186 .
WANG S , GU D W , LIU J R , et al . A power analysis on SMS4 using the chosen plaintext method [C ] // International Conference on Computational Intelligence & Security . 2013 : 748 - 752 .
0
浏览量
1216
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构