高级检索

    SM4密钥扩展算法的单能迹攻击

    Single Trace Attack on SM4 Key Expansion Algorithm

    • 摘要: 在分布式物联网的大规模应用背景下,各实体设备中密码技术作为信息安全的底层支撑架构,正面临着侧信道攻击(SCA)这一物理层安全威胁的严峻挑战. SM4 分组密码算法作为我国自主研制的商用密码算法标准,已深度集成于分布式物联网安全协议中,但其实现层面的侧信道脆弱性问题亟待解决. 针对 SM4 密钥扩展算法的侧信道攻击研究存在空白,现有攻击方法多依赖多能迹统计特性,而单能迹攻击研究匮乏. 研究提出一种基于贝叶斯网络结合建模侧信道攻击的单能迹侧信道攻击方法,针对单条能量轨迹,通过构建概率图模型,结合置信传播算法,实现对轮子密钥的高效推测,进而恢复主密钥. 仿真实验与实测实验表明该攻击方法有效,在理想实测环境下主密钥恢复成功率达 85.74%,即使在实测能迹中添加大量高斯白噪声,使得信噪比仅为 10 dB 的条件下,成功率仍可达 70%. 与传统方法相比,本方法在成功率、所需能量轨迹数量和攻击时间等方面优势显著,为分布式物联网系统含密设备的侧信道攻击研究提供了新的思路与技术手段,也为相关防护设计提供了理论依据和参考.

       

      Abstract: In the context of large-scale applications of distributed Internet of Things (IoT), cryptographic technologies, as the underlying infrastructure for information security, are facing severe challenges from side-channel attacks (SCAs)—a physical-layer security threat. The SM4 block cipher algorithm, as China’s independently developed commercial cryptographic standard, has been deeply integrated into distributed IoT security protocols. However, its implementation-level vulnerabilities to side-channel attacks remain unresolved. Research on side-channel attacks targeting the SM4 key expansion algorithm is scarce, with existing methods primarily relying on multi-trace statistical characteristics, while single-trace attack approaches are under-explored. This paper proposes a single-trace side-channel attack method integrating Bayesian networks with side-channel attack modeling. By constructing a probabilistic graphical model and combining it with the belief propagation algorithm, the method efficiently infers round subkeys from a single power trace, ultimately recovering the master key. Simulation and practical experiments demonstrate the effectiveness of this approach, achieving an 85.74% success rate for master key recovery under ideal conditions. Even when substantial Gaussian white noise is added to practical power traces (resulting in a signal-to-noise ratio of only 10 dB), the success rate remains at 70%. Compared to traditional methods, this approach exhibits significant advantages in success rate, required power traces, and attack duration, offering new insights and technical tools for side-channel attack research on cryptographic devices in distributed IoT systems, as well as theoretical foundations for related defensive designs.

       

    /

    返回文章
    返回