Power Attack of SM4 Hardware Implementation Based on SAKURA-G Board
-
Abstract
Currently, in public researches about SM4 power attack, the power traces are generated by computer simulation or software implementation. However, this is different with hardware implementation which is used in actual. A research of a SM4 algorithm hardware implementation is given out, which is applied in market. we download the Verilog code to a SAKURA-G board, and collect the power traces when it actually operates. Correlation Power Analysis method is used to analyze the leakage of the input of the S-box in the first round, the output of the S-box in the first round and the output registers of the first round. We recovered the sub-key of the first round. By the same method, we can recover the sub-keys of round 2-4, and eventually get the 128-bit key.
-
-