信息网络安全 ›› 2024, Vol. 24 ›› Issue (12): 1871-1881.doi: 10.3969/j.issn.1671-1122.2024.12.006

• 理论研究 • 上一篇    下一篇

一种针对碰撞攻击的白盒SM4改进方案

李科慧1, 陈杰1,2(), 刘君3   

  1. 1.西安电子科技大学通信工程学院,西安 710071
    2.河南省网络密码技术重点实验室,郑州 450001
    3.陕西师范大学计算机科学学院,西安 710119
  • 收稿日期:2024-02-04 出版日期:2024-12-10 发布日期:2025-01-10
  • 通讯作者: 陈杰 jchen@mail.xidian.edu.cn
  • 作者简介:李科慧(1999—),女,辽宁,硕士研究生,主要研究方向为白盒密码的设计与安全性分析|陈杰(1979—),女,湖南,副教授,博士,主要研究方向为密码算法的设计与分析、白盒密码的设计与安全性分析|刘君(1993—),女,陕西,讲师,博士,主要研究方向为白盒密码算法的设计与分析
  • 基金资助:
    国家自然科学基金(62302285);河南省网络密码技术重点实验室研究课题(LNCT2022-A08)

A White-Box Improvement Scheme of SM4 for Collision Attack

LI Kehui1, CHEN Jie1,2(), LIU Jun3   

  1. 1. School of Telecommunications Engineering, Xidian University, Xi’an 710071, China
    2. Henan Key Laboratory of Network Cryptography Technology, Zhengzhou 450001, China
    3. School of Computer Science, Shaanxi Normal University, Xi’an 710119, China
  • Received:2024-02-04 Online:2024-12-10 Published:2025-01-10

摘要:

在白盒攻击模型中,攻击者能够访问密码算法的实现过程,观察或修改密码算法的内部细节。基于白盒密码的概念,姚-陈白盒SM4方案探讨了一种扩充内部状态的白盒SM4设计思路,但此方案未能抵抗碰撞攻击,且恢复密钥的时间复杂度仅为O(223.02)。为了保证白盒SM4在碰撞攻击环境中正常运行,文章提出一种针对碰撞攻击的白盒SM4改进方案。该改进方案引入较多随机仿射变换和随机向量,以复杂化内部编码,从而抵抗碰撞攻击。通过反证法证明,改进方案的轮加密函数不能被转化为碰撞函数,因此无法进行碰撞攻击分析。此外,还论证了该方案可以抵抗BGE攻击、代码提取攻击以及结合差分分析和求解方程组的攻击。针对调整仿射常数的差分分析的攻击方法,该改进方案的密钥空间大小为61200×2128,且对仿射等价攻击的时间复杂度为O(297)。

关键词: 白盒攻击环境, 白盒密码, 碰撞攻击, 复杂化编码

Abstract:

In a white-box attack model, the attacker can access the implementation process of the cryptographic algorithm, observe or modify the internal details of the cryptographic algorithm. Based on the concept of white-box cryptography, Yao-Chen’s white-box SM4 scheme presents a design idea for expanding the internal state of white-box SM4, but the scheme fails to resist the analysis of collision attack, and the time complexity of recovering the key is only O(223.02). In order to ensure the normal operation of white-box SM4 in the collision attack context, this paper proposed a white-box improvement scheme of SM4 for collision attack. This improvement scheme introduced more random affine transformations and random vectors to complicate the internal encoding to resist the collision attack. By using the counter proof method, it was proven that the round encryption function of the improved scheme couldn’t be converted into a collision function, and the analysis of collision attack couldn’t be carried out. In addition, this paper demonstrated that the scheme can also resist BGE attack, code extraction attacks and a combination of differential analysis and methods for solving systems of equations. For the attack method of differential analysis with adjusted affine constant, the key space size of the improved scheme was 61200×2128, and the time complexity for affine equivalent attack was O(297).

Key words: white-box attack context, white-box cryptography, collision attack, complex coding

中图分类号: