HU Wen-jing, WANG An, WU Li-ji, XIE Xin-jun. Power Attack of SM4 Hardware Implementation Based on SAKURA-G Board[J]. Microelectronics & Computer, 2015, 32(4): 15-20.
Citation: HU Wen-jing, WANG An, WU Li-ji, XIE Xin-jun. Power Attack of SM4 Hardware Implementation Based on SAKURA-G Board[J]. Microelectronics & Computer, 2015, 32(4): 15-20.

Power Attack of SM4 Hardware Implementation Based on SAKURA-G Board

  • Currently, in public researches about SM4 power attack, the power traces are generated by computer simulation or software implementation. However, this is different with hardware implementation which is used in actual. A research of a SM4 algorithm hardware implementation is given out, which is applied in market. we download the Verilog code to a SAKURA-G board, and collect the power traces when it actually operates. Correlation Power Analysis method is used to analyze the leakage of the input of the S-box in the first round, the output of the S-box in the first round and the output registers of the first round. We recovered the sub-key of the first round. By the same method, we can recover the sub-keys of round 2-4, and eventually get the 128-bit key.
  • loading

Catalog

    Turn off MathJax
    Article Contents

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return