Power analysis attack of dynamic password token based on SM3
Papers|更新时间:2024-06-05
|
Power analysis attack of dynamic password token based on SM3
Journal on CommunicationsVol. 38, Issue 3, Pages: 65-72(2017)
作者机构:
成都信息工程大学信息安全工程学院,四川 成都 610225
作者简介:
基金信息:
The National Science and Technology Major Project(2014ZX01032401-001);The National High Technology Research and Development Program of China (863 Program)(2012AA01A403);“The 12th Five-Years” National Cryptogram Development Fund(MMJJ201101022);Sichuan Province Science and Technology Program(2017GZ0313);Sichuan Provincial Education Department Scientific Research Projects(17ZB0082);The Scientific Research Talent Fund of CUIT(XAKYXM008);The Scientific Research Talent Fund of CUIT(XAKYXM009);The Scientific Research Talent Fund of CUIT(XAKYXM010);The Scientific Research Talent Fund of CUIT(XAKYXM011)
Zhi-bo DU, Zhen WU, Min WANG, et al. Power analysis attack of dynamic password token based on SM3[J]. Journal on Communications, 2017, 38(3): 65-72.
DOI:
Zhi-bo DU, Zhen WU, Min WANG, et al. Power analysis attack of dynamic password token based on SM3[J]. Journal on Communications, 2017, 38(3): 65-72. DOI: 10.11959/j.issn.1000-436x.2017066.
Power analysis attack of dynamic password token based on SM3
A novel method of the power analysis attack of dynamic password token based on SM3 was first proposed to choose the permutation function output as the power analysis attack target,and the simultaneous equations about the key were composed of the attack results.According to the given inverse permutation function
the key was derived by solving the simultaneous equations based on the inverse permutation function.Measured results are presented to validate the proposed method was effective.The proposed method solved the problems of permutation function keys for direct selection of target as an energy analysis attack target.And the proposed method can also be applied to the power analysis attack of the other cryptographic algorithms.
关键词
Keywords
references
KOCHER P C , . Timing attacks on implementations of Diffie-Hellman,RSA,DSS,and other systems [C ] // The 16th Annual International Cryptology Conference . Santa Barbara,United States , 1996 : 104 - 113 .
KOCHER P , JAFFE J , JUN B . Differential power analysis [C ] // The 19th Annual International Cryptology Conference Santa Barbara . 1999 : 388 - 397 .
JEAN-JACQUES Q . A new tool for non-intrusive analysis of smart cards based on electromagnetic emissions,the SEMA and DEMA methods.Presented at the rump session of EUROCRYPT 2000 [C ] // Rump Session . 2000 .
DAN B , RICHARD A D , RICHARD J L . On the importance of checking cryptographic protocols for faults [C ] // Springer . 1997 : 37 - 51 .
DU Z B , WU Z , WANG M , et al . Power analysis attack of HMAC based on SM3 [J ] . Journal on Communications , 2016 , 37 ( 5 ): 38 - 43 .
XIE J , SUN W , GU D , et al . Research on differential power analysis of HMAC-SM3 [C ] // 2015 International Conference on Computer Science and Intelligent Communication . 2015 : 103 - 106 .
GUO L , WANG L , LIU D , et al . A chosen-plaintext differential power analysis attack on HMAC-SM3 [C ] // The 11th International Conference on Computational Intelligence and Security . 2015 : 350 - 353 .
GUO L , WANG L , LI Q , et al . A first-order differential power analysis attack on HMAC-SM3 [C ] // The First International Conference on Information Science and Electronic Technology . 2015 : 94 - 97 .
GUO L , WANG L , LI Q , et al . Differential power analysis on dynamic password token based on SM3 algorithm,and countermeasures [C ] // The 11th International Conference on Computational Intelligence and Security . 2015 : 354 - 357 .
STEFAN M , ELISABETH O , THOMAS P . Power analysis attacks:revealing the secrets of smart cards [M ] . Springer Science & Business Media , 2008 .
DU Z B , WU Z , WANG M , et al . Improved chosen-plaintext power analysis attack against SM4 at the round-output [J ] . Journal on Communications , 2015 , 36 ( 10 ): 85 - 91 .
WANG M , DU Z B , WU Z , et al . Chosen-plaintext power analysis attack against SMS4 with the round-output as the intermediate data [J ] .2015016. Journal on Communications , 2015 , 36 ( 1 ):
HYUNJIN A , NEIL H , MAIRE O , et al . An improved second-order power analysis attack based on a new refined expecter [C ] // Springer . 2015 : 174 - 186 .
WANG S , GU D W , LIU J R , et al . A power analysis on SMS4 using the chosen plaintext method [C ] // International Conference on Computational Intelligence & Security . 2013 : 748 - 752 .