基于SM3的動態(tài)令牌的能量分析攻擊方法
發(fā)布時間:2018-07-26 21:15
【摘要】:提出一種針對基于SM3的動態(tài)令牌實(shí)施的能量分析攻擊新方法,首次提出選擇置換函數(shù)的輸出作為能量分析攻擊的目標(biāo),并將攻擊結(jié)果聯(lián)立得到方程組。根據(jù)給出的逆置換函數(shù)求解方程組,即可破解最終的密鑰。通過實(shí)測攻擊實(shí)驗(yàn),驗(yàn)證了該攻擊方法的有效性,這就很好地解決了直接選擇密鑰作為能量分析攻擊目標(biāo)所產(chǎn)生的問題,同時,引入中間變量作為能量分析攻擊目標(biāo)破解密鑰方法,還可以應(yīng)用于針對其他密碼算法的能量分析攻擊中。
[Abstract]:A new method of energy analysis attack against dynamic token based on SM3 is proposed. It is the first time that the output of permutation function is chosen as the target of energy analysis attack, and the system of equations is obtained by combining the result of attack. The final key can be solved by solving the equations based on the given inverse permutation function. The effectiveness of the attack method is verified by the experimental results, which solves the problem of selecting the key directly as the energy analysis target. At the same time, The intermediate variable is introduced as the key cracking method for the energy analysis attack target, and it can also be applied to the energy analysis attack against other cryptographic algorithms.
【作者單位】: 成都信息工程大學(xué)信息安全工程學(xué)院;
【基金】:國家重大科技專項(xiàng)基金資助項(xiàng)目(No.2014ZX01032401-001) 國家高技術(shù)研究發(fā)展計劃(“863”計劃)基金資助項(xiàng)目(No.2012AA01A403) “十二五”國家密碼發(fā)展基金資助項(xiàng)目(No.MMJJ201101022) 四川省科技計劃基金資助項(xiàng)目(No.2017GZ0313) 四川省教育廳科研基金資助項(xiàng)目(No.17ZB0082) 成都信息工程大學(xué)科研人才基金資助項(xiàng)目(No.XAKYXM008,No.XAKYXM009,No.XAKYXM010,No.XAKYXM011)~~
【分類號】:TN918.4
[Abstract]:A new method of energy analysis attack against dynamic token based on SM3 is proposed. It is the first time that the output of permutation function is chosen as the target of energy analysis attack, and the system of equations is obtained by combining the result of attack. The final key can be solved by solving the equations based on the given inverse permutation function. The effectiveness of the attack method is verified by the experimental results, which solves the problem of selecting the key directly as the energy analysis target. At the same time, The intermediate variable is introduced as the key cracking method for the energy analysis attack target, and it can also be applied to the energy analysis attack against other cryptographic algorithms.
【作者單位】: 成都信息工程大學(xué)信息安全工程學(xué)院;
【基金】:國家重大科技專項(xiàng)基金資助項(xiàng)目(No.2014ZX01032401-001) 國家高技術(shù)研究發(fā)展計劃(“863”計劃)基金資助項(xiàng)目(No.2012AA01A403) “十二五”國家密碼發(fā)展基金資助項(xiàng)目(No.MMJJ201101022) 四川省科技計劃基金資助項(xiàng)目(No.2017GZ0313) 四川省教育廳科研基金資助項(xiàng)目(No.17ZB0082) 成都信息工程大學(xué)科研人才基金資助項(xiàng)目(No.XAKYXM008,No.XAKYXM009,No.XAKYXM010,No.XAKYXM011)~~
【分類號】:TN918.4
【參考文獻(xiàn)】
相關(guān)期刊論文 前2條
1 杜之波;吳震;王敏;饒金濤;;針對SM4輪輸出的改進(jìn)型選擇明文功耗分析攻擊[J];通信學(xué)報;2015年10期
2 王敏;杜之波;吳震;饒金濤;;針對SMS4輪輸出的選擇明文能量分析攻擊[J];通信學(xué)報;2015年01期
【共引文獻(xiàn)】
相關(guān)期刊論文 前9條
1 杜之波;吳震;王敏;饒金濤;;基于SM3的動態(tài)令牌的能量分析攻擊方法[J];通信學(xué)報;2017年03期
2 吳震;王敏;饒金濤;杜之波;王勝;張凌浩;;針對基于SM3的HMAC的互信息能量分析攻擊[J];通信學(xué)報;2016年S1期
3 杜之波;孫元華;王q,
本文編號:2147309
本文鏈接:http://sikaile.net/kejilunwen/xinxigongchenglunwen/2147309.html
最近更新
教材專著