The XEX-based Tweaked-codebook mode with ciphertext Stealing(XTS)is widely used in storage encryption.With the emergence and application of big data computing and novel side-channel analysis methods,the security of the XTS encryption mode has become a matter of concern.Recent studies have attempted side-channel analysis on the XTS mode,aiming to narrow down the key search space by identifying partial keys and tweak values,but a comprehensive analysis of the XTS mode system has not been achieved.In this paper,a side-channel analysis technique targeting the SM4-XTS circuit is proposed.By combining traditional Correlation Power Analysis(CPA)with a multi-stage fusion CPA technique,the technique addresses the binary number shifting issue caused by the iterative modulation multiplication of the tweak values,enabling precise extraction of both the tweak values and keys.To validate the effectiveness of this analytical technique,an SM4-XTS encryption module is implemented on an FPGA to simulate real-world encryption memory scenarios.Experimental results demonstrate that the technique can successfully extract partial tweak values and keys from the target encryption circuit using only 10 000 power traces.
关键词
SM4-XTS/侧信道分析/分组密码/相关功耗分析
Key words
SM4-XTS/Side-channel Analysis/Block ciphers/Correlation Power Analysis(CPA)