论文部分内容阅读
SM4算法在2012年3月被作为密码行业标准公开以后,已经得到了广泛的应用.但与此同时,由于侧信道攻击的出现及利用,SM4算法在被用于智能卡等密码设备时,也面临着严重威胁.针对差分功耗分析攻击(DPA),虽然已经有部分掩码防御方案提出,但是均是使用有限域上的乘法及求逆运算代替S盒查表法,导致计算量比较大,设计复杂.一些掩码方案由于主要针对S盒变换进行设计,对算法的整体运算覆盖程度不足,也使得SM4算法并未得到全面的防护.本文提出的一种基于S盒查表方法的随机掩码方案,在无需知道和分析SM4算法的S盒的代数结构的情况下,通过对S盒进行一个随机的线性变换,同时结合多路径乘法掩码的特点,达到对算法运行中所有数据掩码的目的,从而抵御DPA攻击.最后本文分别从理论和实际进行攻击实验,得到了针对指定攻击点的具体分析结果.实验结果显示,相比于已有的掩码方案,本文的掩码方法资源消耗少,实现简单方便,代价小,能够有效消除运算时密钥或敏感数据与能量消耗之间的相关性,增强算法的安全性,抵御DPA攻击.
The SM4 algorithm has been widely used since it was released as a cryptographic industry standard in March 2012. But at the same time, the SM4 algorithm is also being used in cryptographic equipment such as smart cards due to the emergence and utilization of side-channel attacks Aiming at the differential power analysis attack (DPA), although some mask defense schemes have been proposed, they both use the multiplication and inversion operations on finite fields instead of the S-box look-up table method, resulting in a large amount of computation, The complexity of the design.Some masking schemes are mainly designed for S-box transformation, and the overall arithmetic coverage of the algorithm is not sufficient, so SM4 algorithm is not fully protected.This paper presents a random list based on the S-box look-up method Without any knowledge of and analysis of the algebraic structure of the S-box of the SM4 algorithm, a random linear transformation is performed on the S-box and combined with the characteristics of the multipath multiplication mask, the data scheme of all the data masks In order to resist the DPA attack.Finally, this paper separately from the theoretical and practical attack experiments, obtained the specific analysis results for the specified attack point.Experimental results show that compared to the With some masking schemes, the masking method in this paper has less resource consumption, simple and convenient implementation, small cost, can effectively eliminate the correlation between key or sensitive data and energy consumption during operation, and enhance the security of the algorithm against DPA attacks .