z-logo
open-access-imgOpen Access
Fault Attack of SMS4 Based on Internal Collisions
Author(s) -
Renjie Zhu,
Ou Qingyu,
Fang Luo
Publication year - 2020
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1486/7/072031
Subject(s) - fault (geology) , key (lock) , computer science , byte , plaintext , encryption , computer security , real time computing , computer hardware , geology , seismology
A fault attack of SMS4 based on internal collision is proposed. The method assumes that the attacker can attack under the condition of selecting plaintext, and adopts the byte-oriented random fault model to successfully recover the original key by injecting the fault in the first few rounds of the encryption algorithm of the SMS4. Theoretical analysis and experimental results show that the 60 fault injections can successfully recover the original key of the SMS4, with a probability of over 99%. If the attacker can control the location of fault injection, then only 16 fault injections are needed to successfully recover the original key of the SMS4. In general, 30 to 40 fault injections can successfully restore the original key.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here