HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189760 (18 Oct 2025)

GM/T 0083-2020 English PDF

US$509.00 · In stock
Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email.
GM/T 0083-2020: Guideline for the mitigation of non-invasive attacks against cryptographic modules
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GM/T 0083-2020English509 Add to Cart 4 days [Need to translate] Guideline for the mitigation of non-invasive attacks against cryptographic modules Valid GM/T 0083-2020

PDF similar to GM/T 0083-2020


Standard similar to GM/T 0083-2020

GM/T 0084   GB/T 15843.1   GA/T 1389   GM/T 0079   GM/T 0080   GM/T 0078   

Basic data

Standard ID GM/T 0083-2020 (GM/T0083-2020)
Description (Translated English) Guideline for the mitigation of non-invasive attacks against cryptographic modules
Sector / Industry Chinese Industry Standard (Recommended)
Classification of Chinese Standard L80
Word Count Estimation 22,226
Date of Issue 2020-12-28
Date of Implementation 2021-07-01
Regulation (derived from) National Cryptography Administration Announcement No. 41
Issuing agency(ies) State Administration of Cryptography

GM/T 0083-2020: Guideline for the mitigation of non-invasive attacks against cryptographic modules


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Guideline for the mitigation of non-invasive attacks against cryptographic modules ICS 35.040 CCSL80 People's Republic of China Password Industry Standard Cryptographic module non-invasive attack mitigation technical guide 2020-12-28 released 2021-07-01 implementation Issued by the National Cryptography Administration

Table of contents

Foreword Ⅰ 1 Scope 1 2 Normative references 1 3 Terms and definitions 1 4 Symbols and abbreviations 2 4.1 Symbol 2 4.2 Abbreviations 3 5 Non-invasive attack methods 3 5.1 Overview 3 5.2 Naming and Classification 4 5.3 Analysis Process 4 5.4 Relevance to safety functions 5 6 Non-invasive attack mitigation techniques 6 6.1 Overview 6 6.2 Timing analysis attack mitigation technology 7 6.3 Energy analysis attack mitigation technology 7 6.4 Electromagnetic analysis attack mitigation technology 10 7 Non-invasive attack test method 11 7.1 Overview 11 7.2 Test Strategy 11 7.3 Test Framework 11 7.4 Test process 12 7.5 Manufacturer Information Required for Testing 16 Appendix A (informative) SM2/SM9 and SM4 non-invasive attack mitigation technology introduction 17 Reference 19 Cryptographic module non-invasive attack mitigation technical guide

1 Scope

This document provides non-intrusive attack methods, mitigation techniques, and test methods for cryptographic modules. This document is suitable for guiding the deployment of non-intrusive attack mitigation techniques in the cryptographic module, and guiding technical personnel in the development and use of the cryptographic module In the process, according to the characteristics of specific cryptographic algorithms, cryptographic module features, and actual deployment scenarios, mitigation technologies are selected to resist non-intrusive Threat of attack.

2 Normative references

The contents of the following documents constitute the indispensable clauses of this document through normative references in the text. Among them, dated quotations Only the version corresponding to that date is applicable to this document; for undated reference documents, the latest version (including all amendments) is applicable to This document. GB/T 25069 Information Security Technical Terms GB/T 32905 Information Security Technology SM3 Cipher Hash Algorithm GB/T 32907 Information Security Technology SM4 Block Cipher Algorithm GB/T 32918 (all parts) Information security technology SM2 elliptic curve public key cryptographic algorithm GB/T 37092-2018 Information Security Technology Cryptographic Module Security Requirements GM/T 0001 (all parts) Zu Chong's sequence cipher algorithm GM/T 0044 (all parts) SM9 identification password algorithm

3 Terms and definitions

The following terms and definitions defined in GB/T 25069 and GB/T 37092 apply to this document. 3.1 Advanced side-channel analysis advanced side-channelattacks Advanced utilization of channel leakage. These leaks mainly depend on the data processed by the cryptographic device and the execution of the secret parameters when retrieving the secret parameters. operate. 3.2 Criticalsecurityparameter Security-related information (e.g. secret and private cryptographic keys, authentication data such as passwords, personal identification numbers, certificates or other Trusted anchor), its leakage or modification will endanger the security of the cryptographic module. Note. The key security parameters may be clear text or encrypted. [GB/T 25069-2010, definition 2.2.2.50] 3.3 Critical safety parameter class CSPclass CSP classification, such as keys, authentication data (such as passwords, PINs, biometric authentication data). 3.4 Differential electromagnetic analysis Analyze the electromagnetic radiation changes of the cryptographic module. For a large number of electromagnetic radiation measurement values, statistical methods are used to determine the classification Side channel analysis process. The simple side-channel analysis process is usually. direct (mainly visual) or visual recognition analysis methods on the cryptographic module Run time, energy consumption or electromagnetic leakage detection and analysis, thereby revealing the secret parameters of the cryptographic algorithm. Advanced side channel analysis usually includes the following steps. a) Perform N measurements on the observed measurement (o_i), and each measurement corresponds to a cryptographic operation with known input X and key K as parameters. Calculate A; b) Select leakage model M for the device; c) Select the observation processing function C (by default, C is set to identity transformation); d) Make an assumption about the possible value of the key K or its subkeys, denoted as h; e) Infer N predicted values pred_i from A, h, (o_i)_i and possible M (each predicted value corresponds to a plaintext, and the Observations corresponding to the plaintext have been obtained); f) Select the statistical test function D, and calculate D[pred_i,C(o_i)]; g) If D[pred_i,C(o_i)] is greater than a certain threshold, the hypothesis h is considered correct. Otherwise, consider that the assumed value is wrong and go back to step Step d) and re-select the hypothetical value h. Among them, step b) and step c) are optional. The threshold in step g) should be selected according to the actual attack method. A classic The method is to select the maximum value in D[pred_i,C(o_i)] corresponding to all key hypotheses as the threshold. Observation o_i is univariate It can also be multivariate. When o_i is a multi-variable, each variable in o_i corresponds to the measured quantity at a different time. o_i dimensions are available d_o said. The observation processing function C(.) is a polynomial function, defined on the d_o-dimensional real number vector set, and the Rd_o table is used below Show, the degree of the polynomial is represented by d_C. Function D(pred_i,.). X→D(pred_i,X) represents a polynomial containing X, polynomial The number of times is d_D, and the value d_C*d_D is the order d of the attack. Collision attack is a special advanced side channel analysis method, and its analysis process mainly includes. a) Perform N measurements on the observed measurement (o_i), and each measurement corresponds to a cryptographic operation with known input X and key K as parameters. Calculate A; b) Extract feature points from different operation moments in the energy trace o_i; c) Assume the possible values of the difference value (k1-k2), and the hypothetical value is denoted as h, where k1 and k2 are the two parts of the target key K respectively Points (that is, the two subkeys in the block cipher implementation); d) Group each observation (o_i)_i according to the differential hypothesis h; e) If it is assumed that the difference value h is the same as the real subkey difference value, then the observable o_i group corresponding to the difference value is selected There is a strong correlation between the different feature points. For example, if the attack targets the operation of F(x1_i k1), the attack will be extracted from the observation o_i and F(x1_i k1) and another Feature points related to the F(x2_i k2) operation, and these observations will be regrouped according to h, and the satisfaction of the observations in each group The quality x2_i-x1_i=h. In order to confirm this hypothesis h, the correlation coefficient is usually used as the test function D. When h correctly predicts k1-k2 The difference value of the observations in the h-th group has a high correlation on the two parts of the feature points corresponding to F(x1_i k1) and F(x2_i k2). All attacks described in this section include vertical attacks, horizontal attacks, and rectangular attacks (i.e. horizontal and vertical attacks). ---In the vertical attack method, each observation o_i corresponds to a different algorithm operation; ---In the horizontal attack method, all o_i correspond to the same algorithm operation; --- In the rectangular attack method, one part of o_i corresponds to the same arithmetic operation and the other part corresponds to a different arithmetic operation. In this document, vertical attack is the default attack method. 5.4 Relevance to safety functions The non-intrusive attack methods described in this section are related to the non-intrusive security functions involved in GB/T 37092. See Appendix C in GB/T 37092-2018, and the correlation between non-intrusive attack methods and security functions is shown in Table 1.Actual use of this document Can be used in conjunction with GB/T 37092-2018. 6.2 Timing analysis attack mitigation technology 6.2.1 Balanced instruction branch technology The balanced instruction branching technology checks all the instruction branches related to key security parameters that appear in the cryptographic module. When the characteristics allow, reduce the variance of the total execution time of instructions of different branches as much as possible, thereby balancing instruction branches and using fixed time Command execution features to combat timing analysis attacks. 6.2.2 Random Delay Insertion Technology The random delay insertion technology counteracts timing analysis attacks by inserting random delay operations in the implementation of cryptographic algorithms. this method It can effectively reduce the accuracy of the attacker's measurement of the execution time of instructions related to key security parameters. From the number of timings required by the attacker In other words, the number of times the attacker needs to perform a successful attack is proportional to the square of the time noise introduced. For example, a modular exponentiation The standard deviation of the operation time of the device is n milliseconds, and the use of timing analysis attacks can restore the key safety of its use in x times of timing measurements. Parameters, when a random delay is introduced to make the standard deviation of the modular exponentiation operator's own operation time become m milliseconds, the number of timing measurements required by the attacker Will become y=(m/n)2*(x). 6.2.3 Blinding technology The blinding technology completely randomizes the time required for the cryptographic operation, so that the intermediate value of the calculation generated during the calculation process is unpredictable. Resist timing analysis attacks. This technique is mainly used in the signature process. Before each signature starts, a random number generator (RNG) is used to generate Into two random numbers (vi, vf), and then the random number vi is combined with the plaintext message to be signed, so that all operations in the subsequent signing process are Method forecast. In order to finally obtain the correct signature result, vf can be derived from vi, and the signature result generated by the blind message is compensated. To the correct plaintext message signature result. 6.3 Energy analysis attack mitigation technology 6.3.1 Hidden technology Common hiding technologies are divided into time-dimension hiding technologies and amplitude-dimension hiding technologies. The hidden technology of the time dimension is mainly For the differential energy analysis attack, it is necessary to collect the energy consumption at a fixed time point on the energy curve for statistical analysis. If the condition cannot be fulfilled If enough, the difficulty of the attack is greatly increased. In the concealment technology of the amplitude dimension, it can be achieved by using dual-track precharge logic and introducing additional noise. Formula to generate a constant voltage amplitude or randomize the measured voltage amplitude, and then hide the energy consumption including the intermediate value of the key safety parameters. a) Time dimension hiding technology 1) Randomly insert pseudo-instruction technology Random insertion pseudo-instruction technology randomly inserts null instructions or some invalid instructions to change the order of cryptographic algorithm instructions Column, reduce the probability of occurrence of real energy consumption generated by sensitive intermediate values at a fixed point in time, and increase energy analysis attacks The difficulty. This technology is easy to deploy in cryptographic modules and will not increase additional computational overhead. However, the technology has instructions The pattern is easy to be recognized, the total time of algorithm encryption is inconsistent, etc., so that this mitigation technology will still be affected by some common attack techniques. Technical analysis, such as simple energy analysis. The mitigation technology of randomly inserting pseudo-instructions should be used as the mitigation technology of the lowest security level To use. 2) Pseudo-wheel computing technology The pseudo-round operation technology is mainly randomized by randomly inserting pseudo-round operations between the modules of the cryptographic algorithm round function. Algorithm execution flow. The pseudo-round operation can be implemented by inserting the forward and reverse round function pairs at the same time, and the pseudo-round function The round key of the pair is a fixed value, independent of the key set by the cryptographic algorithm itself, and the forward encryption round operation and the reverse solution The round keys of the dense round operation are the same, but the round order is reversed. It is difficult for an attacker to determine the internal calculation data of the algorithm and the operating function of the circuit. Correspondence between time-consuming points, and then effectively hide the energy consumption related to key safety parameters. 6.3.2 Masking/Blinding Technology Mask mitigation technology is mainly used in symmetric cryptographic algorithms to randomize all intermediate values generated during the calculation of cryptographic algorithms It cuts off the direct connection between the energy consumption of the cryptographic module and the predictable and sensitive intermediate value. The masking scheme can be divided according to the order of the mask. The N-order mask scheme refers to the protection of all intermediate values generated during the operation with random numbers, and can be expressed in the following form. M0= X M1 M2 Mn, where M0 is called the masked median value, X represents the sensitive median value (which contains key safety parameters), Mi, i ∈[1,n] represents n masked random numbers generated randomly, and "" represents a kind of arithmetic operation, such as XOR operation. Normally, higher-order masks The scheme is more secure than the low-level mask scheme, but it will cause more random number generation overhead, storage overhead, and in the actual operation process. The computational overhead introduced in. The blinding mitigation technology is mainly used in asymmetric cryptographic algorithms. As introduced in 6.2.3, this technology uses randomization of asymmetric cryptography. The algorithm calculates the intermediate value to avoid the attacker's effective prediction of the intermediate value, thereby preventing energy analysis attacks. Therefore, blinding technology does not It can only effectively resist timing analysis attacks, and also has mitigating effects for energy analysis attacks. 6.3.3 Other mitigation techniques In order to deploy higher security mitigation technology in the cryptographic module, while taking into account the resource overhead of the cryptographic module, it is advisable to use a mixed defense mitigation technology. Solution technology. The hybrid defense mitigation technology adopts a low-order mask scheme and a hybrid mitigation technology of order out of order, which can effectively improve the energy analysis attack. Threshold, to provide high security protection for the cryptographic module. Take the first-order mask as an example, although the first-order mask scheme can resist common statistical analysis techniques. However, it is vulnerable to the threat of second-order attacks. For example, since the first-order mask divides the sensitive median value into two random variables M0=X M1 And M1, if the attacker can extract the energy consumption corresponding to these two random variables at a specific moment in the energy trace, then the two parts can The combined energy consumption of the mass consumption will once again have a correlation with the sensitive intermediate value X. To avoid the threat of such energy analysis attacks, The instruction disorder technology is further adopted to randomize the appearance positions of the two random variables divided by the sensitive intermediate value. This kind of Out-of-order processing makes it impossible for an attacker to easily locate the calculated position of each sub-part of the divided intermediate value on the energy curve, which improves the It is difficult for the energy consumption of related locations to be jointly processed, which in turn provides higher security protection for the cryptographic module. 6.4 Electromagnetic analysis attack mitigation technology 6.4.1 Low-power technology The low-power technology suppresses the electromagnetic radiation available from the cryptographic module by reducing the energy consumption of the cryptographic module. 6.4.2 Shielding kit technology The shielding kit technology installs electromagnetic shielding kits outside all components that may cause electromagnetic leakage related to key safety parameters (Such as Faraday cage), suppress or effectively reduce the available electromagnetic radiation, eliminate electromagnetic analysis attacks from the source, that is, eliminate the password module The electromagnetic radiation generated when the operation password calculates the intermediate value. 6.4.3 Spread spectrum clock technology Spread spectrum clock technology mainly uses low-frequency modulation signals to frequency modulate periodic narrowband clocks and expand them into broadband clocks Signal. This method can effectively reduce the fundamental frequency and the amplitude of the harmonics of all digital signals driven by the modulation clock, and the energy of the signal Uniform diffusion in the entire frequency band, to obtain a greater attenuation of electromagnetic radiation. This method of using a spread spectrum clock to reduce peak radiated energy Law is more common in the field of electromagnetic compatibility. 6.4.4 Interleaved dual-track logic technology The interleaved dual-rail logic technology is an improved form of placement and routing of the dual-rail precharge logic technology (see 6.3.1), that is, the interleaved original logic A wiring realization of the logic circuit and compensation logic circuit. The mitigation technology first combines the circuit part including the calculation of key safety parameters with The parts of the logic circuit that do not need to be protected are reasonably divided, and at the same time, the dual-rail precharge logic circuit is implemented on the sensitive circuit, and the maximum The local real circuit and compensation circuit are laid out in adjacent spatial locations. This mitigation can reduce the electromagnetic energy of any part of the dual-track logic circuit The amount consumption remains constant, which effectively hides the energy consumption generated when the intermediate value is operated in the actual operation of the circuit, and resists the subsequent use of statistical analysis methods. Perform an electromagnetic analysis attack for key recovery. 6.4.5 Distributed circuit architecture technology The distributed circuit architecture technology splits the modules related to the calculation of key safety parameters into parallel distributed computing sub-modules. This makes it impossible to collect complete leaked information for electromagnetic analysis attacks against a single detection location, thereby effectively mitigating the dependence on electromagnetic probe pairs. Target calculation module accurately locates the electromagnetic analysis attack threat. 7 Non-invasive attack test methods 7.1 Overview This chapter provides corresponding test methods for the non-intrusive attack methods specified in Chapter 5. 7.2 Test strategy The goal of non-intrusive attack testing is to evaluate whether cryptographic modules that use non-intrusive attack mitigation technologies can provide resistance to non-intrusive attacks. The ability to strike. The test program cannot guarantee that the cryptographic module can completely resist attacks, but an effective test can show that the cryptographic module is fully considered Design and implementation of non-invasive attack mitigation technology. The basic principle of non-intrusive attack testing is to first extract physical quantities from or around the cryptographic module in a non-intrusive method. Then use the bias hidden in the physical quantity to launch the attack. This bias originates from or depends on the secret information of the attacker as the target. interest. In this document, this biased amount that relies on secret information is called a leak. If the experimental results show that the leaked information exceeds the allowable If the leakage threshold is higher, it is considered that the cryptographic module cannot pass the non-intrusive attack test. On the contrary, if the leak is not observed, the attack will fail, then It is believed that the cryptographic module has passed the non-intrusive attack test. This method of testing for the presence or absence of a leak is referred to as leak analysis in this document. The non-intrusive attack test process is to collect and analyze measurement data under certain test restrictions, and determine information about key security parameters The degree of leakage, and these test restrictions include the maximum upper limit of data collection and the test time used. 7.3 Test Framework Testers should check the security of the cryptographic module, including resistance to timing analysis attacks, simple energy/electromagnetic analysis attacks, differential energy/ The ability of electromagnetic analysis attack, non-intrusive attack test framework is shown in Figure 5.The tester should follow the sequence of operations in Figure 5.E.g, A simple energy/electromagnetic analysis test is required after passing the timing analysis attack test. The non-intrusive attack test method in this document does not need to extract the complete key in the cryptographic module. As long as there is a clear If the sensitive information is leaked, it is considered that the cryptographic module has not passed the test.