检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:席小林 王昭鑫 陈万钢 饶金涛 XI Xiaolin;WANG Zhaoxin;CHEN Wangang;RAO Jintao(HAOFU Cryptography Testing Co.,Ltd.,Chengdu Sichuan 610096,China)
机构地区:[1]豪符密码检测技术(成都)有限责任公司,四川成都610096
出 处:《通信技术》2023年第10期1197-1203,共7页Communications Technology
基 金:四川省重点研发项目“基于网络空间安全的商用密码应用监测评估辅助平台的研发”(2022YFG0023)。
摘 要:侧信道攻击技术的出现给SM4算法的实现带来了新的安全挑战。但现有的侧信道攻击对象主要是密码算法由硬件实现的芯片或模块,对软件实现密码算法的软件密码模块进行攻击的分析较少。通过相关性功耗分析,对SM4算法的S-BOX输入、S-BOX输出和轮输出的脆弱点进行分析,并使用采集设备捕获了智能IC卡上软件实现SM4密码算法泄露的侧信息,实现了对智能IC卡软实现SM4算法的侧信道分析。实验结果表明,攻击者可以推断出加密算法中的关键信息,从而恢复出SM4算法的加密密钥,实现了针对软件密码模块的侧信道攻击分析,进一步拓展了侧信道攻击分析的方向。The emergence of side channel attack technology brings new security challenges to the implementation of SM4 algorithm.However,the existing side channel attack targets are mainly chips or modules of cryptographic algorithms implemented by hardware,and there are fewer analyses of attacks on modules of software-implemented cryptographic algorithms.In this study,the vulnerability points of S-BOX input,S-BOX output and wheel output of SM4 algorithm are analyzed by correlation power analysis and the side information leaked by SM4 cryptographic algorithm implemented by software on smart IC card is captured by acquisition equipment,which implements the side channel analysis of SM4 algorithm implemented by software on smart IC card.The experimental results indicate that the attacker can infer the key information of the encryption algorithm and thus recover the encryption key of SM4 algorithm,which realizes the side channel attack analysis for the software cryptographic module and further expands the direction of side channel attack analysis.
分 类 号:TP309.1[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.200