基于SM3的动态令牌的能量分析攻击方法
发布时间:2018-07-26 21:15
【摘要】:提出一种针对基于SM3的动态令牌实施的能量分析攻击新方法,首次提出选择置换函数的输出作为能量分析攻击的目标,并将攻击结果联立得到方程组。根据给出的逆置换函数求解方程组,即可破解最终的密钥。通过实测攻击实验,验证了该攻击方法的有效性,这就很好地解决了直接选择密钥作为能量分析攻击目标所产生的问题,同时,引入中间变量作为能量分析攻击目标破解密钥方法,还可以应用于针对其他密码算法的能量分析攻击中。
[Abstract]:A new method of energy analysis attack against dynamic token based on SM3 is proposed. It is the first time that the output of permutation function is chosen as the target of energy analysis attack, and the system of equations is obtained by combining the result of attack. The final key can be solved by solving the equations based on the given inverse permutation function. The effectiveness of the attack method is verified by the experimental results, which solves the problem of selecting the key directly as the energy analysis target. At the same time, The intermediate variable is introduced as the key cracking method for the energy analysis attack target, and it can also be applied to the energy analysis attack against other cryptographic algorithms.
【作者单位】: 成都信息工程大学信息安全工程学院;
【基金】:国家重大科技专项基金资助项目(No.2014ZX01032401-001) 国家高技术研究发展计划(“863”计划)基金资助项目(No.2012AA01A403) “十二五”国家密码发展基金资助项目(No.MMJJ201101022) 四川省科技计划基金资助项目(No.2017GZ0313) 四川省教育厅科研基金资助项目(No.17ZB0082) 成都信息工程大学科研人才基金资助项目(No.XAKYXM008,No.XAKYXM009,No.XAKYXM010,No.XAKYXM011)~~
【分类号】:TN918.4
[Abstract]:A new method of energy analysis attack against dynamic token based on SM3 is proposed. It is the first time that the output of permutation function is chosen as the target of energy analysis attack, and the system of equations is obtained by combining the result of attack. The final key can be solved by solving the equations based on the given inverse permutation function. The effectiveness of the attack method is verified by the experimental results, which solves the problem of selecting the key directly as the energy analysis target. At the same time, The intermediate variable is introduced as the key cracking method for the energy analysis attack target, and it can also be applied to the energy analysis attack against other cryptographic algorithms.
【作者单位】: 成都信息工程大学信息安全工程学院;
【基金】:国家重大科技专项基金资助项目(No.2014ZX01032401-001) 国家高技术研究发展计划(“863”计划)基金资助项目(No.2012AA01A403) “十二五”国家密码发展基金资助项目(No.MMJJ201101022) 四川省科技计划基金资助项目(No.2017GZ0313) 四川省教育厅科研基金资助项目(No.17ZB0082) 成都信息工程大学科研人才基金资助项目(No.XAKYXM008,No.XAKYXM009,No.XAKYXM010,No.XAKYXM011)~~
【分类号】:TN918.4
【参考文献】
相关期刊论文 前2条
1 杜之波;吴震;王敏;饶金涛;;针对SM4轮输出的改进型选择明文功耗分析攻击[J];通信学报;2015年10期
2 王敏;杜之波;吴震;饶金涛;;针对SMS4轮输出的选择明文能量分析攻击[J];通信学报;2015年01期
【共引文献】
相关期刊论文 前9条
1 杜之波;吴震;王敏;饶金涛;;基于SM3的动态令牌的能量分析攻击方法[J];通信学报;2017年03期
2 吴震;王敏;饶金涛;杜之波;王胜;张凌浩;;针对基于SM3的HMAC的互信息能量分析攻击[J];通信学报;2016年S1期
3 杜之波;孙元华;王q,
本文编号:2147309
本文链接:https://www.wllwen.com/kejilunwen/xinxigongchenglunwen/2147309.html