期刊文献+

基于智能卡实现的分组加密算法的功耗分析 被引量:1

Practical power analysis of smart card implementation of block cipher
在线阅读 下载PDF
导出
摘要 针对基于智能卡硬件实现的SM4分组加密算法的物理泄露安全问题,提出了一种快速、高效的相关功耗分析方法,通过理论分析和实验研究,暴露了即使是理论上非常安全的SM4加密算法,在物理实现过程中也会泄露重要的敏感信息。首先,通过分析SM4算法的实现流程和加密特性,建立功耗分析的数学模型,并推导出解密流程和优化算法;其次,结合理论物理泄露点,搭建完整的智能卡硬件功耗分析实验系统,通过智能卡的功耗数据采集、分析、优化,研究真实智能卡的侧信道安全漏洞;最后,结合实验结果,进一步优化功耗分析,探讨嵌入式系统环境下的SM4算法安全性能。与Mifare DESFire MF3ICD40智能卡三重数据加密标准(3DES)算法侧信道分析相比,所提方法将功耗数据量从25万条降低到不足一千条,分析时间从7个多小时,减小到几分钟,并且完整地恢复了SM4的原始密钥,能有效提高硬件环境下的功耗分析效率,降低计算复杂度。 Focusing on the security issues for SM4 encryption algorithm based on hardware implementation of smart card, a fast and efficient method of correlation power analysis was proposed. The theoretical analysis and experimental research revealed that even theoretically secure encryption algorithm might disclose important sensitive information during the physical implementation process. First, the mathematical model of the power analysis was put forward, and the decryption process and optimization algorithm of it were deduced by analyzing the theoretical implementation process and encryption features of SM4. Second, combined with the theoretical physics leak points, a complete experimental system for smart card hardware power analysis was set up, and the power consumption of smart card data including collection, analysis and optimization was analyzed through real smart card side-channel security. Finally, the experimental results were used to further optimize the power analysis, and the safety performance of SM4 algorithm in embedded system environment was explored. Compared with the Mifare DESFire MF3ICD40 3DES (Triple Data Encryption Standard) algorithm, this research reduced the amount of data consumption from 250000 to less than 1000, reduced the time consumption from more than seven hours to a few minutes, and recovered the complete restoration of the SM4 original key. The proposed method can effectively improve the power analysis efficiency under the hardware environment, and reduce the computational complexity.
作者 付荣
出处 《计算机应用》 CSCD 北大核心 2015年第9期2546-2552,共7页 journal of Computer Applications
基金 国家自然科学基金资助项目(61033001,61361136003) 国家973计划项目(2011CBA00300,2011CBA00301)
关键词 相关功耗分析 侧信道攻击 SM4算法 密钥恢复成功率 汉明重量模型 correlation power analysis side-channel attack SM4 algorithm key-recovery rate Hamming weight model
作者简介 付荣(1989-),男,贵州六盘人,硕士研究生,主要研究方向:智能卡差分功耗分析、侧信道分析。
  • 相关文献

参考文献26

  • 1KOCHER P C, JAFFE J, JUN B. Differential power analysis [ C]// CRYPTO '99: Proceedings of the 19th Annual International Cryptal- ogy Conference on Advances in Cryptology, LNCS 1666. Berlin: Springer, 1999:388-397.
  • 2QUISQUATER J-J, SAMYDE D. ElectroMagnetic Analysis (EMA) : measures and for smart cards [ C]// E-smart 2001 Proceedings of the 2001 International Conference on Research in Smart Cards: Smart Card Programming and Security, LNCS 2140. Berlin: Springer, 2001:200-210.
  • 3KOCHER P C. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems [ C]// CRYPTD 1996: Proceedings of the 16th Annual International Cryptalogy Conference on Advances in Cryptology, LNCS 1109. Berlin: Springer, 1996: 104-113.
  • 4ANDERSON R, KUHN M. Tamper resistance: a cautionary note [ C]/! Proceedings of the Second USENIX Workshop on Electronic Commerce. Berkeley: USENIX Association, 1996:1-11.
  • 5ANDERSON R, KUHN M. Low cost attacks on tamper resistant de- vices [ C]//Proceedings of the Fifth International Security Protocol Workshop, LNCS 1361. Berlin: Springer, 1997:125-136.
  • 6OSWALD D, PAAR C. Breaking mifare DESFire MF31CD40: power analysis and templates in the real world [ C]// CHES 2011: Pro- ceedings of the 13th International Workshop on Cryptographic Hard- ware and Embedded Systems, LNCS 6917. Berlin: Springer, 2011: 207 - 222.
  • 7EISENBARTH T, KASPER T, MORADI A, et al. On the power of power analysis in the real world: a complete break of the KeeLoq code hopping scheme [ C]// CRYPTO 2008: Proceedings of the 28th Annual International Cryptology Conference on Advances in Cryptology, LNCS 5157. Berlin: Springer, 2008:203-220.
  • 8ZHOU Y, YU Y, STANDAERT F-X, et al. On the need of physical security for small embedded devices: a case study with COMP128-1 implementations in SIM cards [ C]// FC 2013: Proceedings of the 17th International Conference on Financial Cryptography and Data Security, LNCS 7859. Berlin: Springer, 2013:230-238.
  • 9国家商用密码管理办公室.无线局域网产品使用的SMS4密码算法[EB/OL].http://www.oscca.gov.cn/UpFil/200622026423297990.pdf.
  • 10中国人民银行技术部.中国金融集成电路卡规范[EB/OL].(2013-02-03)[2015-02-03].http://www.cspress.cn/u/cms/www/201305/08135924pxoo.pdf/.

二级参考文献31

  • 1张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602. 被引量:68
  • 2KELSEY J, SCHNE/ER B, WANGNER D, et al. Side channel crypt-analysis of product ciphers[A]. The European Symposium on Research in Computer Security-ESORICS '98[C]. Louvain-la-Neuve, Belgium, 1998.97-110.
  • 3BONEH D, DEMILLO R A, LIPTON R J. On the importance of checking cryptographic protocols for faults[A]. EUROCRYPT'97[C]. Konstanz, Germany, 1999.37-51.
  • 4KOCHER C P. Timing analysis on implementations of Diffie-Hellman, RSA, DSS, and other systems[A]. CRYPTO'96[C]. Santa Barbara, California, 1996. 204-223.
  • 5KOCHER C P, JAFFE J, JUN B. Differential power analysis[A]. CRYPTO'99[C]. 1999.388-397.
  • 6BIHAM E, SHAMIR A. Differential fault analysis of secret key cryptosystems[A]. CRYPTO'97[C]. Santa Barbara, California, USA, 1997. 523-525.
  • 7BIEHL I, MEYER B, MULLER V. Differential fault analysis on elliptic curve cryptosystems[A]. CRYPTO 2000[C]. Santa Barbara, California, 2000. 232-246.
  • 8BLOMER J, SEIFERT J E Fault based cryptanalysis of the advanced encryption standard (AES)[A]. Financial Cryptography-FC 2003[C]. Guadeloupe, French West Indies, 2003. 162-181.
  • 9GIRAOUD C. DFA on AES[A]. Advanced Encryption Standard-AES[C]. Berlin, 2005.27-41.
  • 10CHEN C N, YEN S M. Differential fault analysis on AES key schedule and some countermeasures[A]. Proceedings of the Australasian Conference on Information Security and Privacy-ACISP 2003[C]. Wollongong, Australia, 2003. 118-129.

共引文献79

同被引文献10

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部