Font Size: a A A

Design And Implementation Of Anti-attack Based On SM4 Cryptographic Algorithm

Posted on:2022-03-14Degree:MasterType:Thesis
Country:ChinaCandidate:B RaoFull Text:PDF
GTID:2518306539461744Subject:Control Engineering
Abstract/Summary:PDF Full Text Request
Side channel attack technology has become a close concern and important branch in the field of cryptography research.Power analysis attack technology has become one of the most commonly used attack methods in side-channel attack technology.The physical channel uses auxiliary equipment to attack the password being executed.Algorithms or security equipment,etc.Collect power consumption and analyze the relevant information of the power consumption curve to obtain the key information we need.Compared with electromagnetic radiation attacks,error attacks,timing attacks,template attacks,caches and other attack methods,side-channel power analysis attacks have the characteristics of simple implementation,obvious attack effects and easy analysis.Therefore,side-channel power consumption attacks have been studied,the favor of the readers.The continuous innovation and breakthrough of side-channel attack technology has also promoted the rapid development of side-channel protection technology,and different types of protection schemes have been proposed one after another.The side-channel attack technology and the protection technology mutually restrict and promote each other,which makes the side-channel analysis technology develop comprehensively and rapidly.The SM4 block cipher algorithm is the first published commercial cipher algorithm in my country,and it has been formulated as a national WAPI standard to ensure the security of WLAN data information transmission.It has been widely used and further promoted,showing my country to the international community,the research level of cryptography is of great significance to the research and development of cryptography in my country.The SM4cryptographic algorithm is constantly updated in the side-channel attack technology,and the protection scheme is also being upgraded simultaneously,so that the side-channel analysis technology can be quickly and comprehensively improved.This article mainly focuses on the research work of the SM4 cryptographic algorithm in the side-channel related fields.The main contents are as follows:(1)The principle of SM4 cryptographic algorithm is studied,and the unique nonlinear unit S-box in the algorithm is analyzed in detail,and the design of the hardware code module of SM4 algorithm is completed.Using simulation software to simulate the hardware code of the SM4 algorithm to verify the correctness of the algorithm's encryption and decryption functions,it also provides a guarantee for the experimental simulation of the SM4 algorithm in this paper in the side channel attack technology and protection scheme.(2)The attack technology of side channel analysis is studied,and the attack method of Correlation Power Analysis(CPA),Differential Power Analysis(DPA)and injection electromagnetic Fault Attack in the side channel analysis of the SM4 cryptographic algorithm is designed.The Hamming weight model of intermediate data is used to characterize power consumption information,and an experimental test platform is built in combination with related applications and hardware.And use the experimental platform to simulate and test the attack method,collect the relevant power consumption curve of the cryptographic algorithm round key,derive the algorithm's master key information according to the principle of the SM4algorithm,and inject the Faulty Attack to generate the wrong ciphertext.The pair also successfully restored the algorithm's master key information.Experiments have proved that these designed attack methods are effective against SM4 algorithm attacks.(3)The technology of side-channel analysis protection is studied.Aiming at the non-linear S-box part of the SM4 cryptographic algorithm,the protection schemes of multiplication mask and addition and multiplication mixed mask are proposed.According to the algebraic structure of the S-box,the finite field GF(2~8),which is complex and not easy to implement,is transformed to the easy-to-implement GF(((2~2)~2)~2)field and reconstructed to remove the entire mask the derivation process.By using the same attack method to carry out experimental simulation and testing,it is verified that the algorithm can not obtain the master key information of the SM4 cryptographic algorithm after the mask countermeasure.By comparing the performance parameters of other related masking schemes,this article is in the mask scheme designed on the side-channel protection technology of the SM4 algorithm is feasible.
Keywords/Search Tags:side channel analysis, SM4 cryptographic algorithm, side channel power attack and protection, finite field, random mask
PDF Full Text Request
Related items