对SM4算法的改进差分故障攻击
SM4算法是国内首个官方公布的商用密码算法. 本文研究SM4 密码算法在差分故障攻击方向的安全性. 在现有故障模型的基础上, 针对现有故障注入能力已提高至比特级别的现状, 提出面向比特的随机故障模型. 理论上, 本攻击模型通过1 次单比特故障注入, 结合平均15.3526比特的穷举攻击, 就可以完全恢复出SM4的128比特初始密钥. 由于SM4算法S盒的差分均匀度为4, 也即存在四个解的差分方程, 因此实际攻击时穷举攻击的复杂度将高于理论值2 比特左右;随后在普通PC 机上进行了大量 的仿真实验, 实验结果也佐证了这一事实, 恢复SM4 初始密钥的穷举攻击复杂度大约在15到18比特....
Saved in:
Published in | Journal of Cryptologic Research Vol. 7; no. 4; p. 453 |
---|---|
Main Authors | , , , , , , , |
Format | Journal Article |
Language | Chinese |
Published |
Beijing
Chinese Association for Cryptologic Research, Journal of Cryptologic Research
01.01.2020
|
Subjects | |
Online Access | Get full text |
ISSN | 2097-4116 |
DOI | 10.13868/j.cnki.jcr.000380 |
Cover
Abstract | SM4算法是国内首个官方公布的商用密码算法. 本文研究SM4 密码算法在差分故障攻击方向的安全性. 在现有故障模型的基础上, 针对现有故障注入能力已提高至比特级别的现状, 提出面向比特的随机故障模型. 理论上, 本攻击模型通过1 次单比特故障注入, 结合平均15.3526比特的穷举攻击, 就可以完全恢复出SM4的128比特初始密钥. 由于SM4算法S盒的差分均匀度为4, 也即存在四个解的差分方程, 因此实际攻击时穷举攻击的复杂度将高于理论值2 比特左右;随后在普通PC 机上进行了大量 的仿真实验, 实验结果也佐证了这一事实, 恢复SM4 初始密钥的穷举攻击复杂度大约在15到18比特. |
---|---|
AbstractList | SM4算法是国内首个官方公布的商用密码算法. 本文研究SM4 密码算法在差分故障攻击方向的安全性. 在现有故障模型的基础上, 针对现有故障注入能力已提高至比特级别的现状, 提出面向比特的随机故障模型. 理论上, 本攻击模型通过1 次单比特故障注入, 结合平均15.3526比特的穷举攻击, 就可以完全恢复出SM4的128比特初始密钥. 由于SM4算法S盒的差分均匀度为4, 也即存在四个解的差分方程, 因此实际攻击时穷举攻击的复杂度将高于理论值2 比特左右;随后在普通PC 机上进行了大量 的仿真实验, 实验结果也佐证了这一事实, 恢复SM4 初始密钥的穷举攻击复杂度大约在15到18比特. |
Author | 王相宾 Xiang-Bin, WANG 金雨璇 Hong-Zhi, YANG Qing-Jun, YUAN 袁庆军 Yu-Xuan, JIN 杨宏志 |
Author_xml | – sequence: 1 givenname: JIN surname: Yu-Xuan fullname: Yu-Xuan, JIN – sequence: 2 givenname: YANG surname: Hong-Zhi fullname: Hong-Zhi, YANG – sequence: 3 givenname: WANG surname: Xiang-Bin fullname: Xiang-Bin, WANG – sequence: 4 givenname: YUAN surname: Qing-Jun fullname: Qing-Jun, YUAN – sequence: 5 fullname: 金雨璇 – sequence: 6 fullname: 杨宏志 – sequence: 7 fullname: 王相宾 – sequence: 8 fullname: 袁庆军 |
BookMark | eNotjT1OAkEYQKfAREQuYGthtev3zf-UhviXQCywJzPDbMJqdnFXbuDfASAm6BmgsDCEwtPsordQo8173Xs7pJHlWSBkDyFGpqU-TGOfXY3i1BcxADANDdKkYFTEEeU2aZflyIEQkmnKsUkOquWq3-ObxXP9NtvM7-rp6vPjpXpfVE8P9ez-a_5aT9fV43qXbCX2ugztf7dI_-T4snMWdS9OzztH3WgsNI8wETh0JtigqPRmqBm1QlovtQNAK3iiDEoQGETiFPNO_yLxnpqgLWctsv9XHRf5zSSUt4M0nxTZz3BAtTEMUEnBvgHp3FAj |
ContentType | Journal Article |
Copyright | 2020. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: 2020. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | JQ2 |
DOI | 10.13868/j.cnki.jcr.000380 |
DatabaseName | ProQuest Computer Science Collection |
DatabaseTitle | ProQuest Computer Science Collection |
DatabaseTitleList | ProQuest Computer Science Collection |
DeliveryMethod | fulltext_linktorsrc |
GroupedDBID | -SI -S~ ALMA_UNASSIGNED_HOLDINGS CAJEI JQ2 PB1 PB9 Q-- |
ID | FETCH-LOGICAL-p584-1f51db9eae726c9d832a56ac68b001a54f7916051e5fb73cb873cbfcc29e8a43 |
ISSN | 2097-4116 |
IngestDate | Mon Jun 30 15:00:53 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 4 |
Language | Chinese |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-p584-1f51db9eae726c9d832a56ac68b001a54f7916051e5fb73cb873cbfcc29e8a43 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
PQID | 2899301765 |
PQPubID | 6503834 |
ParticipantIDs | proquest_journals_2899301765 |
PublicationCentury | 2000 |
PublicationDate | 20200101 |
PublicationDateYYYYMMDD | 2020-01-01 |
PublicationDate_xml | – month: 01 year: 2020 text: 20200101 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | Beijing |
PublicationPlace_xml | – name: Beijing |
PublicationTitle | Journal of Cryptologic Research |
PublicationYear | 2020 |
Publisher | Chinese Association for Cryptologic Research, Journal of Cryptologic Research |
Publisher_xml | – name: Chinese Association for Cryptologic Research, Journal of Cryptologic Research |
SSID | ssib055638241 ssib058688234 |
Score | 2.1829154 |
Snippet | SM4算法是国内首个官方公布的商用密码算法. 本文研究SM4 密码算法在差分故障攻击方向的安全性. 在现有故障模型的基础上, 针对现有故障注入能力已提高至比特级别的现状, 提出面向比特的随机故障模型. 理论上, 本攻击模型通过1 次单比特故障注入, 结合平均15.3526比特的穷举攻击,... |
SourceID | proquest |
SourceType | Aggregation Database |
StartPage | 453 |
SubjectTerms | Algorithms Complexity Cryptography Difference equations Encryption |
Title | 对SM4算法的改进差分故障攻击 |
URI | https://www.proquest.com/docview/2899301765 |
Volume | 7 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnR3LbtNAcBXaCxcEAsSjoB5YcUAbHHufxzhyFFVteDQRKZfIu7bLQ0qrkBzomdcHtEIqfEM5cEBRD3xNUvgLZm3HiUh5Xlaj8a7X9oxnZnfngdAt7RmmqIkJNU5EaKgZkZI7xAkjrlWkwOK2wckbTd5o07UO65RKozmvpeFAl83eqXEl_0NVwAFdbZTsP1C2uCkgAAb6QgsUhvavaIwDhqt17KvNDYoDgasBVgIHHPseVsxiVBVLajGKQjccSOzXsfLtQD_tD4CUWPK0D8AwStlRqjYdlXaWAoBfGLK1_svdQSZDC0e-QpgMSWcY5mWYi1Ofxk5vmzxOywnf2ao2i_JeHeDVbeJnaQ0ezV14AAqWrA1T_FY7T0Cb71W4zk97FbYkeGzzrcw4L3WmPO05swOEP79KKipdRwlCK1nU5lSuizn2pXMymmbZiRd0hye5TJWH6T1_Wn5m-uX03NSZacqpd0DzXrfeXl_vtoJO6wxadoWwHgLLftC8_3AqzGziNenObE0Gd5du6uVQPG0exGUnvrsw7YJxkFo8rfPoXP5ZVqsZ311Apb0nF9Ht8acRcNvJ0fvJ54OTw1eT_dG3rx_GX47G795MDl5_P_w42T8evz2-hDbrQavWIHmxDbILNiipJKwSaRWHsXC5UREI-pDx0HBpzeqQ0UTAQgIkeMwSLTyjpW0SY1wVy5B6l9FSb6cXX0GrTuiIyBNCRCEsVRMuK0kiI6ZjLd2KlvwqWpm-Vzf_l1507bIfVI3g7NrvL19HZ2eMtYKWBv1hfAPMwoG-mRPgB4bZYYE |
linkProvider | ProQuest |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%E5%AF%B9SM4%E7%AE%97%E6%B3%95%E7%9A%84%E6%94%B9%E8%BF%9B%E5%B7%AE%E5%88%86%E6%95%85%E9%9A%9C%E6%94%BB%E5%87%BB&rft.jtitle=Journal+of+Cryptologic+Research&rft.au=Yu-Xuan%2C+JIN&rft.au=Hong-Zhi%2C+YANG&rft.au=Xiang-Bin%2C+WANG&rft.au=Qing-Jun%2C+YUAN&rft.date=2020-01-01&rft.pub=Chinese+Association+for+Cryptologic+Research%2C+Journal+of+Cryptologic+Research&rft.issn=2097-4116&rft.volume=7&rft.issue=4&rft.spage=453&rft_id=info:doi/10.13868%2Fj.cnki.jcr.000380&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2097-4116&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2097-4116&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2097-4116&client=summon |