{"title":"SMS4密钥调度的代数侧信道攻击","authors":"L. Huiying, Wang Tao, Zhao Xinjie, Wu Kehui","doi":"10.1109/IMCCC.2011.143","DOIUrl":null,"url":null,"abstract":"Algebraic Side-channel attacks (ASCA) have been recently introduced as a powerful cryptanalysis technique against block cipher. These attacks represent both a target algorithm and its physical information leakages as an over-defined system of equations that the adversary tries to solve. In this paper, we apply ASCA to the SMS4 key schedule based on Hamming weight model. Experiments show that ASCA are still applicable in this context, 8 rounds of consecutive leakages can solve for the key with in 20 seconds and 24 rounds of randomly distributed leakages can solve for the key within 40 seconds.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Algebraic Side-Channel Attack on SMS4 Key Schedule\",\"authors\":\"L. Huiying, Wang Tao, Zhao Xinjie, Wu Kehui\",\"doi\":\"10.1109/IMCCC.2011.143\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Algebraic Side-channel attacks (ASCA) have been recently introduced as a powerful cryptanalysis technique against block cipher. These attacks represent both a target algorithm and its physical information leakages as an over-defined system of equations that the adversary tries to solve. In this paper, we apply ASCA to the SMS4 key schedule based on Hamming weight model. Experiments show that ASCA are still applicable in this context, 8 rounds of consecutive leakages can solve for the key with in 20 seconds and 24 rounds of randomly distributed leakages can solve for the key within 40 seconds.\",\"PeriodicalId\":446508,\"journal\":{\"name\":\"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-10-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IMCCC.2011.143\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMCCC.2011.143","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Algebraic Side-Channel Attack on SMS4 Key Schedule
Algebraic Side-channel attacks (ASCA) have been recently introduced as a powerful cryptanalysis technique against block cipher. These attacks represent both a target algorithm and its physical information leakages as an over-defined system of equations that the adversary tries to solve. In this paper, we apply ASCA to the SMS4 key schedule based on Hamming weight model. Experiments show that ASCA are still applicable in this context, 8 rounds of consecutive leakages can solve for the key with in 20 seconds and 24 rounds of randomly distributed leakages can solve for the key within 40 seconds.