Improved chosen-plaintext power analysis attack against SM4 at the round-output
academic paper|更新时间:2024-06-05
|
Improved chosen-plaintext power analysis attack against SM4 at the round-output
Journal on CommunicationsVol. 36, Issue 10, Pages: 85-91(2015)
作者机构:
成都信息工程大学 信息安全工程学院,四川 成都 610225
作者简介:
基金信息:
The National Science and Technology Major Project(2014ZX01032401-001);The National High Technology Research and Development Program of China (863 Program)(2012AA01A403);“The 12th Five-Years” National Cryptogram Development Fund(MMJJ201101022);Sichuan Science and Technology Support Programmer(2014GZ0148);Education Department Key Scientific Research Projects of Sichuan Prov-ince(13ZA0091);The Scientific Research Foundation of CUIT(CRF201301)
Zhi-bo DU, Zhen WU, Min WANG, et al. Improved chosen-plaintext power analysis attack against SM4 at the round-output[J]. Journal on Communications, 2015, 36(10): 85-91.
DOI:
Zhi-bo DU, Zhen WU, Min WANG, et al. Improved chosen-plaintext power analysis attack against SM4 at the round-output[J]. Journal on Communications, 2015, 36(10): 85-91. DOI: 10.11959/j.issn.1000-436x.2015270.
Improved chosen-plaintext power analysis attack against SM4 at the round-output
The power analysis attack on SM4 using the chosen-plaintext method was proposed by Wang et al in 2013 CIS.The fixed data was introduced in the method when attacking the round key.However
the attack process was complex.There were many problems in the process
such as more power traces
more numbers of the chosen-plaintext and acquisition power traces.The correlation between the fixed data and the round key were presented
which could be used to decode the round key.Based on the correlation
the improved chosen-plaintext power analysis attack against SM4 at the round-output was proposed.The proposed method attacked the fixed data by analyzing the power traces of the special plaintext.And the round key was derived based on the correlation.The results show that the proposed attack algorithm is effective.The proposed method not only improves the efficiency of the attack by reducing number of power traces
number of the chosen-plaintext and number of acquisition power traces
but also can be applied to a chosen-plaintext power analysis attack against SM4 at the shift operation.
关键词
Keywords
references
PAUL K , JOSHUA J , BENJAMIN J . Differential power analysis [A ] . Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology [C ] . 1999 . 388 - 397 .
ERIC B , CHRISTOPHE C , FRANCIS O . Correlation power analysis with a leakage model [A ] . Proceeding of 6th International Workshop Cambridge [C ] . MA,USA , 2004 . 16 - 29 .
CHEN A D , XU S , CHEN Y , et al . Collision-based chosen-message simple power clustering attack algorithm [J ] . China Communications , 2013 , 10 ( 5 ): 114 - 119 .
WU Z , CHEN Y , CHEN J , et al . Exponential information’s extraction from power traces of modulo exponentiation implemented on FPGA [J ] . Journal on Communications , 2010 , 31 ( 2 ): 17 - 21 .
SHEN W . Investigation of Power Analysis Attacks and Its CounterMeasures on SMS4 Cipher Algorithm [D ] . Xi’an:Xidian University , 2009 .
BAI X F , XU Y H , GUO L . Securing SMS4 cipher against differential power analysis and its VLSI implementation [A ] . Proceedings of 11th IEEE International Conference on Communication Systems [C ] . 2008 . 167 - 172 .
ZHAO X J , WANG T , ZHENG Y Y . Cache timing attack on SMS4 [J ] . Journal on Communications , 2010 , 31 ( 6 ): 89 - 97 .
WANG S T , GU D W , LIU J R , et al . A power analysis on SMS4 using the chosen plaintext method [A ] . 2013 Ninth International Conference on Computational Intelligence and Security [C ] . Springer , 2013 . 748 - 752 .
SURESH C , JOSYULA R R , PANKAJ R . Template attacks [A ] . Proceedings of 4th International Workshop Redwood Shores [C ] . CA,USA , 2003 . 13 - 28 .
WANG M , DU Z B , WU Z , et al . Chosen-plaintext power analysis attack against SMS4 with the round-output as the intermediate data [J ] . Journal on Communications , 2015 , 36 ( 1 ):2015016.
BRIER E , CLAVIER C , OLIVIER F . Correlation power analysis with a leakage module [A ] . Proceedings of 6th International Workshop Cambridge [C ] . MA,USA , 2004 . 125 - 134 .