• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Du Zhibo, Wu Zhen, Wang Min, Rao Jintao. Multi-Point Joint Power Analysis Attack Against SM4[J]. Journal of Computer Research and Development, 2016, 53(10): 2224-2229. DOI: 10.7544/issn1000-1239.2016.20160420
Citation: Du Zhibo, Wu Zhen, Wang Min, Rao Jintao. Multi-Point Joint Power Analysis Attack Against SM4[J]. Journal of Computer Research and Development, 2016, 53(10): 2224-2229. DOI: 10.7544/issn1000-1239.2016.20160420

Multi-Point Joint Power Analysis Attack Against SM4

More Information
  • Published Date: September 30, 2016
  • The current power analysis attack of SM4 belongs to the single point power analysis attack. The single point power analysis attack does not use all the information related with the key in the algorithm and the single power trace. There are two limitations with the single point power analysis attack: it needs more power traces when SM4 is attacked, and the information utilization rate of the attack is low. To solve the questions of the attack, a novel method of multi-point joint power analysis attack of SM4 is proposed in this paper. Multiple information leakage points related with the key are selected at the same time. Multi-point joint power leakage function is constructed by the intermediate variable of the information leakage points and the power leakage model. The key of SM4 is attacked out by the proposing attack. The experiments demonstrate the effectiveness of the proposed attack method, and comparing with the single point power analysis attack method, the proposed attack method can improve the attack success rate, reduce the number of the attack traces, and improve the energy efficiency of the attack. According to the characteristics of the proposed method, it can also be applied to the power analysis attacks of the other cryptographic algorithms.
  • Related Articles

    [1]Wang Chuang, Ding Yan, Huang Chenlin, Song Liantao. Bitsliced Optimization of SM4 Algorithm with the SIMD Instruction Set[J]. Journal of Computer Research and Development, 2024, 61(8): 2097-2109. DOI: 10.7544/issn1000-1239.202220531
    [2]Hao Zeyu, Dai Tianao, Huang Yicheng, Duan Cenlin, Dong Jin, Wu Shiyong, Zhang Bo, Wang Xueyan, Jia Xiaotao, Yang Jianlei. Efficient Design and Implementation of SM4 Algorithm with CBC Mode[J]. Journal of Computer Research and Development, 2024, 61(6): 1450-1457. DOI: 10.7544/issn1000-1239.202331007
    [3]Pan Yinxue, Wang Gaoli, Ni Jianqiang. Finding Differential Characteristics of SM4 Algorithm Based on MILP[J]. Journal of Computer Research and Development, 2022, 59(10): 2299-2308. DOI: 10.7544/issn1000-1239.20220486
    [4]Fan Lingyan, Zhou Meng, Luo Jianjun, Liu Hailuan. IC Design with Multiple Engines Running CBC Mode SM4 Algorithm[J]. Journal of Computer Research and Development, 2018, 55(6): 1247-1253. DOI: 10.7544/issn1000-1239.2018.20170144
    [5]Zhang Heng, Zhang Libo, WuYanjun. Large-Scale Graph Processing on Multi-GPU Platforms[J]. Journal of Computer Research and Development, 2018, 55(2): 273-288. DOI: 10.7544/issn1000-1239.2018.20170697
    [6]Han Xiaowei, Wu Liji, Wang Beibei, Wang An. Atomic Algorithm Against Simple Power Attack of SM2[J]. Journal of Computer Research and Development, 2016, 53(8): 1850-1856. DOI: 10.7544/issn1000-1239.2016.20150052
    [7]Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi. Quantitative Evaluation of the Cryptographic Block’s Resistibility to Power Analysis Attack at Different Design Level[J]. Journal of Computer Research and Development, 2009, 46(6): 940-947.
    [8]Zhao Jia, Zeng Xiaoyang, Han Jun, Wang Jing, and Chen Jun. VLSI Implementation of an AES Algorithm Resistant to Differential Power Analysis Attack[J]. Journal of Computer Research and Development, 2007, 44(3).
    [9]Wu Zhenqiang, Ma Jianfeng. A Joint-Entropy-Based Anonymity Metrics Model with Multi-Property[J]. Journal of Computer Research and Development, 2006, 43(7): 1240-1245.
    [10]Yi Yeqing, Lin Yaping, Lin Mu, Li Xiaolong, Wang Lei. Blind Source Separation Based on Genetic Algorithm[J]. Journal of Computer Research and Development, 2006, 43(2): 244-252.

Catalog

    Article views (1181) PDF downloads (478) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return