Cache timing attack on SMS4

Two access driven Cache timing analysis methods on both first four rounds and last four rounds of SMS4 encryption were proposed and discussed.On the precondition of not interfering SMS4 encryption,a spy process was designed to gather the un-accessed lookup table related Cache sets during first four...

Full description

Saved in:
Bibliographic Details
Main Authors: ZHAO Xin-jie, WANG Tao, ZHENG Yuan-yuan
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2010-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74647708/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537725472178176
author ZHAO Xin-jie
WANG Tao
ZHENG Yuan-yuan
author_facet ZHAO Xin-jie
WANG Tao
ZHENG Yuan-yuan
author_sort ZHAO Xin-jie
collection DOAJ
description Two access driven Cache timing analysis methods on both first four rounds and last four rounds of SMS4 encryption were proposed and discussed.On the precondition of not interfering SMS4 encryption,a spy process was designed to gather the un-accessed lookup table related Cache sets during first four rounds and last four rounds of SMS4 encryption,then transferred them into impossible lookup table indices,combing plaintext or cipher text to analyze the impossible key byte candidates,finally the initial SMS4 key was recovered.Experiment results demonstrate that multi-process sharing Cache space feature and SMS4 lookup table structure decide that SMS4 is vulnerable to Cache timing attack,for about 80 samples are enough to recover full 128bit SMS4 key during both first four rounds attack and last four rounds attack,so it’s necessary to take certain countermeasures to prevent this kind of attack.
format Article
id doaj-art-5410b6c0996b42f6997f6ab59c0ce8fb
institution Kabale University
issn 1000-436X
language zho
publishDate 2010-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-5410b6c0996b42f6997f6ab59c0ce8fb2025-01-14T08:25:20ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2010-01-0131899874647708Cache timing attack on SMS4ZHAO Xin-jieWANG TaoZHENG Yuan-yuanTwo access driven Cache timing analysis methods on both first four rounds and last four rounds of SMS4 encryption were proposed and discussed.On the precondition of not interfering SMS4 encryption,a spy process was designed to gather the un-accessed lookup table related Cache sets during first four rounds and last four rounds of SMS4 encryption,then transferred them into impossible lookup table indices,combing plaintext or cipher text to analyze the impossible key byte candidates,finally the initial SMS4 key was recovered.Experiment results demonstrate that multi-process sharing Cache space feature and SMS4 lookup table structure decide that SMS4 is vulnerable to Cache timing attack,for about 80 samples are enough to recover full 128bit SMS4 key during both first four rounds attack and last four rounds attack,so it’s necessary to take certain countermeasures to prevent this kind of attack.http://www.joconline.com.cn/zh/article/74647708/SMS4access drivenCache timing attackCache settable lookup index
spellingShingle ZHAO Xin-jie
WANG Tao
ZHENG Yuan-yuan
Cache timing attack on SMS4
Tongxin xuebao
SMS4
access driven
Cache timing attack
Cache set
table lookup index
title Cache timing attack on SMS4
title_full Cache timing attack on SMS4
title_fullStr Cache timing attack on SMS4
title_full_unstemmed Cache timing attack on SMS4
title_short Cache timing attack on SMS4
title_sort cache timing attack on sms4
topic SMS4
access driven
Cache timing attack
Cache set
table lookup index
url http://www.joconline.com.cn/zh/article/74647708/
work_keys_str_mv AT zhaoxinjie cachetimingattackonsms4
AT wangtao cachetimingattackonsms4
AT zhengyuanyuan cachetimingattackonsms4