guojuntang / sm4_dfa

differential fault analysis attacks (DFA) against SM4
MIT License
9 stars 2 forks source link

WhiteBox SM4 #1

Open viVi1522 opened 4 years ago

viVi1522 commented 4 years ago

Hi, have you ever tried to attack white box SM4 or found a specific attack on white box SM4 before?

guojuntang commented 4 years ago

Hi, have you ever tried to attack white box SM4 or found a specific attack on white box SM4 before?

Hi. Actually, the reason I wrote this script is to attack WhiteBox SM4 like Deadpool on WhiteBox AES, but failed.

viVi1522 commented 4 years ago

Hi, have you ever tried to attack white box SM4 or found a specific attack on white box SM4 before?

Hi. Actually, the reason I wrote this script is to attack WhiteBox SM4 like Deadpool on WhiteBox AES, but failed.

Thank you very much for your reply. Have you continued to try? Is it feasible to attack white box SM4 by DCA and DFA attacks in Deadpool ?

guojuntang commented 4 years ago

I don’t focus on this work now. But I think I could give you some suggestions about DFA on WBSM4. The core to attack WBSM4 is that you should generate the “faulty cipher” in some way and analyze it. For example, you can run the WB program under the emulator like PANDA and Unicorn Engine(https://eprint.iacr.org/2017/355.pdf) so that you can inject the fault during runtime. After collecting the “faulty cipher”, you may extract the key with my script.