信息网络安全 ›› 2018, Vol. 18 ›› Issue (5): 52-58.doi: 10.3969/j.issn.1671-1122.2018.05.006

• • 上一篇    下一篇

SM4硬件电路的功耗分析研究

陈颖1,2, 陈长松3, 胡红钢1,2()   

  1. 1.中国科学技术大学信息科学技术学院,安徽合肥 230027
    2.中国科学院电磁空间信息重点实验室,安徽合肥230027
    3.公安部第三研究所网络安全研发中心,上海 200031
  • 收稿日期:2018-03-07 出版日期:2018-05-15 发布日期:2020-05-11
  • 作者简介:

    作者简介:陈颖(1993—),女,安徽,硕士研究生,主要研究方向为旁路分析、密码算法设计与实现;陈长松(1973—),男,福建,研究员,博士,主要研究方向为网络安全、数据分析;胡红钢(1978—),男,四川,教授,博士,主要研究方向为伪随机序列、编码理论、密码学与网络安全。

  • 基金资助:
    国家自然科学基金[61522210, 61632013]

Research on Power Analysis of SM4 Hardware Implementation

Ying CHEN1,2, Changsong CHEN3, Honggang HU1,2()   

  1. 1. School of Information Science and Technology, University of Science and Technology of China, Hefei Anhui 230027, China
    2. Key Laboratory of Electromagnetic Space Information, CAS, Hefei Anhui 230027, China
    3. Network Security Research and Development Center, The Third Research Institute of the Ministry of Public Security, Shanghai 200031, China
  • Received:2018-03-07 Online:2018-05-15 Published:2020-05-11

摘要:

SM4是无线局域网产品使用的分组密码算法。文章主要研究对硬件实现的SM4算法的功耗分析方法,提出了一种基于Welch’s t检验和主成分分析的选择明文功耗分析方法,并在ChipWhisperer实验平台上对FPGA上运行的SM4算法进行了实际的攻击实验。实验结果表明,本方法能够有效地减少攻击成功所需要的曲线条数,并降低分析的复杂度。

关键词: SM4算法, 功耗分析, 硬件实现, ChipWhisperer

Abstract:

SM4 is a block cipher used in wireless LAN products. This paper mainly studies the power analysis on SM4 cipher implemented in hardware, and proposes a novel chosen-plaintext method power analysis attack based on Welch's t test and principal component analysis.This paper achieves an attack of SM4 on FPGA in ChipWhisperer experimental platform. The results show that this method can effectively reduce the number of power consumption waveforms required for a successful attack,and reduce the complexity of analysis.

Key words: SM4, power analysis, hardware implementation, ChipWhisperer

中图分类号: