Cache timing attack on SMS4
Two access driven Cache timing analysis methods on both first four rounds and last four rounds of SMS4 encryption were proposed and discussed.On the precondition of not interfering SMS4 encryption,a spy process was designed to gather the un-accessed lookup table related Cache sets during first four...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2010-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74647708/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537725472178176 |
---|---|
author | ZHAO Xin-jie WANG Tao ZHENG Yuan-yuan |
author_facet | ZHAO Xin-jie WANG Tao ZHENG Yuan-yuan |
author_sort | ZHAO Xin-jie |
collection | DOAJ |
description | Two access driven Cache timing analysis methods on both first four rounds and last four rounds of SMS4 encryption were proposed and discussed.On the precondition of not interfering SMS4 encryption,a spy process was designed to gather the un-accessed lookup table related Cache sets during first four rounds and last four rounds of SMS4 encryption,then transferred them into impossible lookup table indices,combing plaintext or cipher text to analyze the impossible key byte candidates,finally the initial SMS4 key was recovered.Experiment results demonstrate that multi-process sharing Cache space feature and SMS4 lookup table structure decide that SMS4 is vulnerable to Cache timing attack,for about 80 samples are enough to recover full 128bit SMS4 key during both first four rounds attack and last four rounds attack,so it’s necessary to take certain countermeasures to prevent this kind of attack. |
format | Article |
id | doaj-art-5410b6c0996b42f6997f6ab59c0ce8fb |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2010-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-5410b6c0996b42f6997f6ab59c0ce8fb2025-01-14T08:25:20ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2010-01-0131899874647708Cache timing attack on SMS4ZHAO Xin-jieWANG TaoZHENG Yuan-yuanTwo access driven Cache timing analysis methods on both first four rounds and last four rounds of SMS4 encryption were proposed and discussed.On the precondition of not interfering SMS4 encryption,a spy process was designed to gather the un-accessed lookup table related Cache sets during first four rounds and last four rounds of SMS4 encryption,then transferred them into impossible lookup table indices,combing plaintext or cipher text to analyze the impossible key byte candidates,finally the initial SMS4 key was recovered.Experiment results demonstrate that multi-process sharing Cache space feature and SMS4 lookup table structure decide that SMS4 is vulnerable to Cache timing attack,for about 80 samples are enough to recover full 128bit SMS4 key during both first four rounds attack and last four rounds attack,so it’s necessary to take certain countermeasures to prevent this kind of attack.http://www.joconline.com.cn/zh/article/74647708/SMS4access drivenCache timing attackCache settable lookup index |
spellingShingle | ZHAO Xin-jie WANG Tao ZHENG Yuan-yuan Cache timing attack on SMS4 Tongxin xuebao SMS4 access driven Cache timing attack Cache set table lookup index |
title | Cache timing attack on SMS4 |
title_full | Cache timing attack on SMS4 |
title_fullStr | Cache timing attack on SMS4 |
title_full_unstemmed | Cache timing attack on SMS4 |
title_short | Cache timing attack on SMS4 |
title_sort | cache timing attack on sms4 |
topic | SMS4 access driven Cache timing attack Cache set table lookup index |
url | http://www.joconline.com.cn/zh/article/74647708/ |
work_keys_str_mv | AT zhaoxinjie cachetimingattackonsms4 AT wangtao cachetimingattackonsms4 AT zhengyuanyuan cachetimingattackonsms4 |