SM4算法是中国无线局域网产品的分组密码算法。功耗分析由于代价低、攻击效率高,因此对密码算法形成了很大的威胁。以SM4算法为研究对象,SIC90C58AD微控制器为硬件仿真平台,采集相同密钥不同明文的SM4密码算法功耗曲线,分别研究了差分功耗分析及相关功耗分析的攻击方法。实验结果表明:使用相关功耗分析,210条功耗曲线可以恢复出第一轮的轮密钥;使用差分功耗分析,3500条功耗曲线可以恢复出第一轮的轮密钥。
SM4 algorithm is a kind of block dpher algorithm for wireless local area network (WEAN) products in china. Pow- er analysis poses a big threat to cryptographic algorithm because of its low cost and high efficiency. Taking SM4 as target algo- rithm, STC90C58AD micro controller as hardware simulation platform, power constmaption traces were collected with the same key and different plaintext. The attack method of differential power analysis and Correlation power analysis were re- searched respectively. The result shows that: using related power analysis,210 traces can recover the first round key, using differential power analysis,3500 traces is enough to recover the first round key.