期刊文献+

一种SM4掩码方法和抗DPA攻击分析 被引量:12

A Method of Masking SM4 and Analysis against DPA Attacks
下载PDF
导出
摘要 SM4算法在2012年3月被作为密码行业标准公开以后,已经得到了广泛的应用.但与此同时,由于侧信道攻击的出现及利用,SM4算法在被用于智能卡等密码设备时,也面临着严重威胁.针对差分功耗分析攻击(DPA),虽然已经有部分掩码防御方案提出,但是均是使用有限域上的乘法及求逆运算代替S盒查表法,导致计算量比较大,设计复杂.一些掩码方案由于主要针对S盒变换进行设计,对算法的整体运算覆盖程度不足,也使得SM4算法并未得到全面的防护.本文提出的一种基于S盒查表方法的随机掩码方案,在无需知道和分析SM4算法的S盒的代数结构的情况下,通过对S盒进行一个随机的线性变换,同时结合多路径乘法掩码的特点,达到对算法运行中所有数据掩码的目的,从而抵御DPA攻击.最后本文分别从理论和实际进行攻击实验,得到了针对指定攻击点的具体分析结果.实验结果显示,相比于已有的掩码方案,本文的掩码方法资源消耗少,实现简单方便,代价小,能够有效消除运算时密钥或敏感数据与能量消耗之间的相关性,增强算法的安全性,抵御DPA攻击. As an industrial cryptographic standard published in March 2012, SM4 has been widely used. However, in cryptographic devices such as smart cards, it is also under severe threat with the emergence and the utilization of the SCA(Side-Channel Attack). Although several countermeasures have been proposed to resist the attack of differential power analysis(DPA), they all use multiplication and inversion over a finite field instead of S-box look-up tables, leading to complex computational cost and complicated design. As some masking countermeasures are mainly aimed at transformation of S-Boxes, SM4 is not under full protection because of the insufficient coverage of these schemes. Without knowing and analyzing the algebraic structure of SM4's S-Box, this paper proposes a random masking scheme based on the S-box look-up table implementation by using a method of linear transformation to S-box with a random number. The scheme could make all routines and all intermediate data of SM4 being masked to resist the attack of DPA, combined with the characteristics of multi-path multiplicative masking method. Finally, the paper utilizes attack experiments both in theory and practice, and gets the analysis results in detail. The experiment results show that, compared with the existing masking schemes, the proposed scheme reduces the consumption of resource and the implementation is easy and costless. The proposed scheme could effectively eliminate the correlation between the key or sensitive data and the energy consumption, increase the algorithm's security and the resistance against the DPA attack.
作者 裴超
出处 《密码学报》 CSCD 2016年第1期79-90,共12页 Journal of Cryptologic Research
关键词 SM4算法 侧信道攻击 差分功耗分析攻击 SM4 algorithm side channel attack DPA
  • 相关文献

参考文献19

二级参考文献21

  • 1张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602. 被引量:67
  • 2国家商用密码管理办公室.无线局域网产品使用的SMS4密码算法[EB/OL].http//:www.oscca.gov.en/up-File 200621016423197990.pdf,2006. 被引量:8
  • 3Office of State Commercial Cipher Administration.SMS4 cipher for WLAN products[EB/OL].http:www.oscca.gov.cn/up-File 200621016423197990.pdf,2006. 被引量:1
  • 4Kocher P,Jaffe J,Jun B.Differential Power Analysis[C] ∥Proceedings of Advances in Cryptology-CRYPTO 99.Springer-Verlag,1999:388-397. 被引量:1
  • 5Rabaey J M.Digital Integrated Circuits[M].Englewood Cliffs,NJ:Prentice-Hall,1996. 被引量:1
  • 6Kocher P,Jaffe J,Jun Benjamin.Differential PowerAnalysis[C]//Proc.of CRYPTO’99.[S.l.]:Springer-Verlag,1999:388-397. 被引量:1
  • 7Mangard S,Pramstaller N,Oswald E.Successfully AttackingMasked AES Hardware Implementations[C]//Proc.of Workshopon Cryptographic Hardware and Embedded Systems.[S.l.]:Springer-Verlag,2005:157-171. 被引量:1
  • 8Joye M,Paillier P,Schoenmakers B.On Second-order DifferentialPower Analysis[C]//Proc.of Workshop on CryptographicHardware and Embedded Systems.[S.l.]:Springer-Verlag,2005:293-308. 被引量:1
  • 9Chari S,Jutla C,Rao J R,et al.A Cautionary Note RegardingEvaluation of AES Candidates on Smart-cards[C]//Proc.of the 2ndAES Candidate Conference.Rome,Italy:[s.n.],1999:133-147. 被引量:1
  • 10Fahn P N,Pearson P K.IPA:A New Class of PowerAttacks[C]//Proc.of Workshop on Cryptographic Hardware andEmbedded Systems.[S.l.]:Springer-Verlag,1999:173-186. 被引量:1

共引文献24

同被引文献31

引证文献12

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部