Computer Science ›› 2019, Vol. 46 ›› Issue (11A): 493-495.

• Information Security • Previous Articles     Next Articles

Study on SM4 Differential Fault Attack Under Extended Fault Injection Range

ZHU Ren-jie   

  1. (Department of Information Security,Naval University of Engineering,Wuhan 430000,China)
  • Online:2019-11-10 Published:2019-11-20

Abstract: In order to make the differential fault attack on SM4 block cipher easier to implement under real conditions,various methods were studied and analyzed in depth for SM4 differential fault attack in this paper.Among the existing fault attack methods,this paper proposed a new attack method,which allow the scope of fault injection to extend to the 26th round of encryption algorithm.The limitation is removed that the fault must be injected into the last four rounds of encryption algorithm in the previous attack methods,and the purpose is achieved than expanding the fault injection range.

Key words: Different fault attack, Extended fault injection range, SM4 block cipher

CLC Number: 

  • TP301
[1]国家密码管理局.国家密码管理局公告(7号)[EB/OL].[2016-11-04].http://www.oscca.gov.cn/News/200709/News_1105.htm.
[2]SU B Z,WU W L,ZHANG W T.Security of the SMS4 Block Cipher Against Differential Cryptanalysis[J].Journal of Computer Science & Technology,2011(1):132-140.
[3]LIU M J,CHEN J Z.Improved Linear Attacks on the Chinese Block Cipher Standard[J].Journal of Computer Science and Technology,2014:197-207.
[4]马猛,赵亚群,刘庆聪,等.SMS4算法的多维零相关线性分析[J].密码学报,2015,2(5):458-466.
[5]PIRET G,QUISQUATER J J.A differential fault attack technique against SPN structure,with application to the AES and KHAZAD[C]∥C.D.Walter,ÇK.Koçc,and C.Paar,editors,Cryptographic Hardware and Embedded Systems CHES 2003,volume 2779 of Lecture Notes in Computer Science.Springer Verlag,2003:77-88.
[6]TUNSTALL M,MUKHOPADHYAY D.Differential faultanalysis of the Advanced Encryption Standard using a single fault[J].Cryptology ePrint Archive,Report 2009/575,2009.
[7]BIHAM E,SHAMIR A.Differential Fault Analysis of SecretKey Cryptosystems[C]∥Proceedings of the 17th AnnualInternational Cryptology Conference.Berlin,Germany:Springer,1997:513-525.
[8]RIVAIN M.Differential fault analysis on DES middle rounds[C]∥International Workshop on Cryptograhic Hardware and Embedded Systems.Berlin:Springer,2009:457-469.
[9]HEMME L.A differential fault attack against early rounds of (Triple-)DES.[C]∥International Workshop on Cryptograhic Hardware and Embedded Systems.Berlin:Springer,2004:254-267.
[10]MATSUI M.On correlation between the order of S-boxes and the strength of DES[C]∥DeSantis,A.(ed.) Advances in Cryptology—EUROCRYPT ’94,Lecture Notes in ComputerScience.Berlin:Springer,1995:366-375.
[11]张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006(9):86-92.
[12]荣雪芳,吴震,王敏,等.基于随机故障注入的SM4差分故障攻击方法[J].计算机工程,2016,42(7):129-133.
[13]王敏,吴震,饶金涛,等.针对SM4算法的约减轮故障攻击[J].通信学报,2016,37(S1):98-103.
[14]李玮.若干分组密码算法的故障攻击研究[D].上海:上海交通大学,2009.
[15]陶智.若干对称密码算法的安全性分析[D].上海:东华大学,2015.
[16]ABHISHEK C,BODHISATWA M,DEBDEEP M.Combinedside-channel and fault analysis attack on protected grain family of stream ciphers[OL].http://eprint.iacr.org/2015/602.pdf,2015.
[17]REN Y,WANG A,WU L.Transient-steady effect attack onblock ciphers[C]∥Cryptographic Hardware and Embedded Systems(CHES).Saint Malo,France,2015:433-450.
[18]SIKHAR P,ABHISHEK C,DEBDEEP M.Fault tolerant infective countermeasure for AES[J].Security,Privacy and Applied Cryptography Engineering,2015,935(4):190-209.
[1] LU Chen-yang, DENG Su, MA Wu-bin, WU Ya-hui, ZHOU Hao-hao. Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients [J]. Computer Science, 2022, 49(9): 183-193.
[2] SHAO Zi-hao, YANG Shi-yu, MA Guo-jie. Foundation of Indoor Information Services:A Survey of Low-cost Localization Techniques [J]. Computer Science, 2022, 49(9): 228-235.
[3] ZHANG Yuan, KANG Le, GONG Zhao-hui, ZHANG Zhi-hong. Related Transaction Behavior Detection in Futures Market Based on Bi-LSTM [J]. Computer Science, 2022, 49(7): 31-39.
[4] SUN Gang, WU Jiang-jiang, CHEN Hao, LI Jun, XU Shi-yuan. Hidden Preference-based Multi-objective Evolutionary Algorithm Based on Chebyshev Distance [J]. Computer Science, 2022, 49(6): 297-304.
[5] WANG Yong, CUI Yuan. Cutting Edge Method for Traveling Salesman Problem Based on the Shortest Paths in Optimal Cycles of Quadrilaterals [J]. Computer Science, 2022, 49(6A): 199-205.
[6] LI Dan-dan, WU Yu-xiang, ZHU Cong-cong, LI Zhong-kang. Improved Sparrow Search Algorithm Based on A Variety of Improved Strategies [J]. Computer Science, 2022, 49(6A): 217-222.
[7] LU Chen-yang, DENG Su, MA Wu-bin, WU Ya-hui, ZHOU Hao-hao. Clustered Federated Learning Methods Based on DBSCAN Clustering [J]. Computer Science, 2022, 49(6A): 232-237.
[8] HU Cong, HE Xiao-hui, SHAO Fa-ming, ZHANG Yan-wu, LU Guan-lin, WANG Jin-kang. Traffic Sign Detection Based on MSERs and SVM [J]. Computer Science, 2022, 49(6A): 325-330.
[9] YANG Jian-nan, ZHANG Fan. Classification Method for Small Crops Combining Dual Attention Mechanisms and Hierarchical Network Structure [J]. Computer Science, 2022, 49(6A): 353-357.
[10] ZHANG Jia-hao, LIU Feng, QI Jia-yin. Lightweight Micro-expression Recognition Architecture Based on Bottleneck Transformer [J]. Computer Science, 2022, 49(6A): 370-377.
[11] WANG Fang-hong, FAN Xing-gang, YANG Jing-jing, ZHOU Jie, WANG De-en. Strong Barrier Construction Algorithm Based on Adjustment of Directional Sensing Area [J]. Computer Science, 2022, 49(6A): 612-618.
[12] TIAN Zhen-zhen, JIANG Wei, ZHENG Bing-xu, MENG Li-min. Load Balancing Optimization Scheduling Algorithm Based on Server Cluster [J]. Computer Science, 2022, 49(6A): 639-644.
[13] LIU Jian-mei, WANG Hong, MA Zhi. Optimization for Shor's Integer Factorization Algorithm Circuit [J]. Computer Science, 2022, 49(6A): 649-653.
[14] CHEN Bo-chen, TANG Wen-bing, HUANG Hong-yun, DING Zuo-hua. Pop-up Obstacles Avoidance for UAV Formation Based on Improved Artificial Potential Field [J]. Computer Science, 2022, 49(6A): 686-693.
[15] ZHANG Zhi-long, SHI Xian-jun, QIN Yu-feng. Diagnosis Strategy Optimization Method Based on Improved Quasi Depth Algorithm [J]. Computer Science, 2022, 49(6A): 729-732.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!