Chosen-plaintext power analysis attack against SMS4 with the round-output as the intermediate data
Academic paper|更新时间:2024-06-05
|
Chosen-plaintext power analysis attack against SMS4 with the round-output as the intermediate data
Journal on CommunicationsVol. 36, Issue 1, Pages: 142-148(2015)
作者机构:
1. 四川大学 电子信息学院,四川 成都 610041
2. 成都信息工程学院 信息安全工程学院,四川 成都 610225
作者简介:
基金信息:
The National Science and Technology Major Project(2014ZX01032401-001);The National High Technology Research and Development Program of China (863 Program)(2012AA01A403);“The 12th Five-Years” National Cryptogram Development Fund(MMJJ201101022);Sichuan Science and Technology Support Programmer(2014GZ0148);Education Department Key Scientific Research Projects of Sichuan Prov-ince(13ZA0091);The Scientific Research Foundation of CUIT(CRF201301)
Min WANG, Zhi-bo DU, Zhen WU, et al. Chosen-plaintext power analysis attack against SMS4 with the round-output as the intermediate data[J]. Journal on Communications, 2015, 36(1): 142-148.
DOI:
Min WANG, Zhi-bo DU, Zhen WU, et al. Chosen-plaintext power analysis attack against SMS4 with the round-output as the intermediate data[J]. Journal on Communications, 2015, 36(1): 142-148. DOI: 10.11959/j.issn.1000-436x.2015016.
Chosen-plaintext power analysis attack against SMS4 with the round-output as the intermediate data
The method of chosen-plaintext power analysis attack against SMS4 with the round-output as the intermediate data is proposed.Firstly
this method attacks out the output of the iterative function.Then the sub key can be achieved by the output of the iterative function.And it is achieved to make the attack real and improve the efficiency
when SMS4 is attacked by taking of the method.In particular
the actual experiment of the method is done
and the results show that the attack algorithm is correct and effective.
关键词
Keywords
references
KOCHER P , JAFFE J , JUN B . Differential power analysis [A ] . Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology [C ] . 1999 . 388 - 397 .
WU Z , CHEN Y , CHEN J , et al . Exponential information's extraction from power traces of modulo exponentiation implemented on FPGA [J ] . Journal on Communications , 2010 , 31 ( 2 ): 17 - 21 .
CHEN A D , XU S , CHEN Y . Collision-based chosen-plaintext simple power clustering attack algorithm [J ] . China Communications , 2013 ,( 5 ): 114 - 119 .
BRIER E , CLAVIER C , OLIVIER F . Correlation power analysis with a leakage module [A ] . CHES 2004 [C ] . 2004 . 125 - 134 .
SHEN W . Investigations of Power Analysis Attacks and its Countermeasures on SMS4 Cipher Algorithm [D ] . Xi'an : Xidian University , 2009 .
BAI X F , XU Y H , GUO L . Securing SMS4 cipher against differential power analysis and its VLSI implementation [A ] . Proceedings of 11th IEEE International Conference on Communication Systems [C ] . Guangzhou,China , 2008 . 167 - 172 .