ISSN 1000-1239 CN 11-1777/TP

• 信息安全 •

### 针对SM4密码算法的多点联合能量分析攻击

1. (成都信息工程大学 成都 610225) (du139123456789@163.com)
• 出版日期: 2016-10-01
• 基金资助:
“核高基”国家科技重大专项基金项目(2014ZX01032401-001)；国家“八六三”高技术研究发展计划基金项目(2012AA01A403)；四川省科技支撑计划基金项目(2014GZ0148)；四川省教育厅重点科研基金项目(13ZA0091)；成都信息工程学院科研基金项目(CRF201301) This work was supported by the National Science and Technology Major Projects of Hegaoji (2014ZX01032401-001), the National High Technology Research and Development Program of China (863 Program) (2012AA01A403), the Key Technology Research and Development Program of Sichan Province (2014GZ0148), the Major Scientific Research Foundation of Sichuan Educational Commission (13ZA0091), and the Scientific Research Foundation of CUIT (CRF201301).

### Multi-Point Joint Power Analysis Attack Against SM4

Du Zhibo, Wu Zhen, Wang Min, Rao Jintao

1. (Chengdu University of Information Technology, Chengdu 610225)
• Online: 2016-10-01

Abstract: The current power analysis attack of SM4 belongs to the single point power analysis attack. The single point power analysis attack does not use all the information related with the key in the algorithm and the single power trace. There are two limitations with the single point power analysis attack: it needs more power traces when SM4 is attacked, and the information utilization rate of the attack is low. To solve the questions of the attack, a novel method of multi-point joint power analysis attack of SM4 is proposed in this paper. Multiple information leakage points related with the key are selected at the same time. Multi-point joint power leakage function is constructed by the intermediate variable of the information leakage points and the power leakage model. The key of SM4 is attacked out by the proposing attack. The experiments demonstrate the effectiveness of the proposed attack method, and comparing with the single point power analysis attack method, the proposed attack method can improve the attack success rate, reduce the number of the attack traces, and improve the energy efficiency of the attack. According to the characteristics of the proposed method, it can also be applied to the power analysis attacks of the other cryptographic algorithms.