Next Article in Journal
Fast Format-Aware Fuzzing for Structured Input Applications
Previous Article in Journal
Multi-Band Array Antenna Sharing a Common Aperture with Heterogeneous Array Elements
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Chosen Plaintext Combined Attack against SM4 Algorithm

1
Chengdu Institute of Computer Application, Chinese Academy of Sciences, Chengdu 610081, China
2
University of Chinese Academy of Sciences, Beijing 100049, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2022, 12(18), 9349; https://doi.org/10.3390/app12189349
Submission received: 10 August 2022 / Revised: 9 September 2022 / Accepted: 13 September 2022 / Published: 18 September 2022
(This article belongs to the Topic Cyber Security and Critical Infrastructures)

Abstract

The SM4 algorithm is widely used to ensure the security of data transmission. The traditional chosen plaintext power attacks against SM4 usually need to analyze four rounds power traces in turn to recover the secret key. In this paper, we propose a new combined chosen plaintext power analysis, which combines the chosen plaintext power attack and the differential characteristics of the substitution box (S-box) in SM4. In our attack, only the second and fourth round S-box outputs of SM4 algorithm are used as attack points, and some sensitive fixed intermediate values are obtained by power analysis when inputting specific plaintext. Then the differential analysis of these sensitive intermediate values is carried out to calculate the difference between the input and output of the S-box, and the key can be recovered from the differential characteristics of S-box. Compared with the traditional chosen plaintext power analysis, which requires four rounds of analysis, our analysis reduces the number of attack rounds into two rounds, and adopts the nonlinear S-box with obvious leakage information as the attack intermediate value, which effectively improves the feasibility of attack. Finally, a practical attack experiment is carried out on a Field Programmable Gate Array (FPGA) based implementation of SM4 algorithm, and the results show that our method is feasible and effective for real experiments.
Keywords: SM4; power analysis attack; differential cryptanalysis; combined attack SM4; power analysis attack; differential cryptanalysis; combined attack

Share and Cite

MDPI and ACS Style

Rao, J.; Cui, Z. Chosen Plaintext Combined Attack against SM4 Algorithm. Appl. Sci. 2022, 12, 9349. https://doi.org/10.3390/app12189349

AMA Style

Rao J, Cui Z. Chosen Plaintext Combined Attack against SM4 Algorithm. Applied Sciences. 2022; 12(18):9349. https://doi.org/10.3390/app12189349

Chicago/Turabian Style

Rao, Jintao, and Zhe Cui. 2022. "Chosen Plaintext Combined Attack against SM4 Algorithm" Applied Sciences 12, no. 18: 9349. https://doi.org/10.3390/app12189349

APA Style

Rao, J., & Cui, Z. (2022). Chosen Plaintext Combined Attack against SM4 Algorithm. Applied Sciences, 12(18), 9349. https://doi.org/10.3390/app12189349

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop