Power analysis attack of dynamic password token based on SM3
A novel method of the power analysis attack of dynamic password token based on SM3 was first proposed to choose the permutation function output as the power analysis attack target,and the simultaneous equations about the key were composed of the attack results.According to the given inverse permutat...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2017-03-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017066/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539496282161152 |
---|---|
author | Zhi-bo DU Zhen WU Min WANG Jin-tao RAO |
author_facet | Zhi-bo DU Zhen WU Min WANG Jin-tao RAO |
author_sort | Zhi-bo DU |
collection | DOAJ |
description | A novel method of the power analysis attack of dynamic password token based on SM3 was first proposed to choose the permutation function output as the power analysis attack target,and the simultaneous equations about the key were composed of the attack results.According to the given inverse permutation function,the key was derived by solving the simultaneous equations based on the inverse permutation function.Measured results are presented to validate the proposed method was effective.The proposed method solved the problems of permutation function keys for direct selection of target as an energy analysis attack target.And the proposed method can also be applied to the power analysis attack of the other cryptographic algorithms. |
format | Article |
id | doaj-art-3e3b8afb82ae4c42b9f8e323cbadecfd |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2017-03-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-3e3b8afb82ae4c42b9f8e323cbadecfd2025-01-14T07:11:50ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2017-03-0138657259708510Power analysis attack of dynamic password token based on SM3Zhi-bo DUZhen WUMin WANGJin-tao RAOA novel method of the power analysis attack of dynamic password token based on SM3 was first proposed to choose the permutation function output as the power analysis attack target,and the simultaneous equations about the key were composed of the attack results.According to the given inverse permutation function,the key was derived by solving the simultaneous equations based on the inverse permutation function.Measured results are presented to validate the proposed method was effective.The proposed method solved the problems of permutation function keys for direct selection of target as an energy analysis attack target.And the proposed method can also be applied to the power analysis attack of the other cryptographic algorithms.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017066/dynamic password tokenSM3 algorithmpower analysis attackpermutation function output |
spellingShingle | Zhi-bo DU Zhen WU Min WANG Jin-tao RAO Power analysis attack of dynamic password token based on SM3 Tongxin xuebao dynamic password token SM3 algorithm power analysis attack permutation function output |
title | Power analysis attack of dynamic password token based on SM3 |
title_full | Power analysis attack of dynamic password token based on SM3 |
title_fullStr | Power analysis attack of dynamic password token based on SM3 |
title_full_unstemmed | Power analysis attack of dynamic password token based on SM3 |
title_short | Power analysis attack of dynamic password token based on SM3 |
title_sort | power analysis attack of dynamic password token based on sm3 |
topic | dynamic password token SM3 algorithm power analysis attack permutation function output |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017066/ |
work_keys_str_mv | AT zhibodu poweranalysisattackofdynamicpasswordtokenbasedonsm3 AT zhenwu poweranalysisattackofdynamicpasswordtokenbasedonsm3 AT minwang poweranalysisattackofdynamicpasswordtokenbasedonsm3 AT jintaorao poweranalysisattackofdynamicpasswordtokenbasedonsm3 |