Correlation power attack on amessage authentication code based on SM3

Ye YUAN, Kai-ge QU, Li-ji WU, Jia-wei MA, Xiang-min ZHANG

PDF(1553 KB)
PDF(1553 KB)
Front. Inform. Technol. Electron. Eng ›› 2019, Vol. 20 ›› Issue (7) : 930-945. DOI: 10.1631/FITEE.1800312
Orginal Article
Orginal Article

Correlation power attack on amessage authentication code based on SM3

Author information +
History +

Abstract

Hash-based message authentication code (HMAC) is widely used in authentication and message integrity. As a Chinese hash algorithm, the SM3 algorithm is gradually winning domestic market value in China. The side channel security of HMAC based on SM3 (HMAC-SM3) is still to be evaluated, especially in hardware implementation, where only intermediate values stored in registers have apparent Hamming distance leakage. In addition, the algorithm structure of SM3 determines the difficulty in HMAC-SM3 side channel analysis. In this paper, a skillful bit-wise chosen-plaintext correlation power attack procedure is proposed for HMAC-SM3 hardware implementation. Real attack experiments on a field programmable gate array (FPGA) board have been performed. Experimental results show that we can recover the key from the hypothesis space of 2256 based on the proposed procedure.

Keywords

HMAC-SM3 / Side channel analysis / Correlation power attack / Bit-wise chosen-plaintext

Cite this article

Download citation ▾
Ye YUAN, Kai-ge QU, Li-ji WU, Jia-wei MA, Xiang-min ZHANG. Correlation power attack on amessage authentication code based on SM3. Front. Inform. Technol. Electron. Eng, 2019, 20(7): 930‒945 https://doi.org/10.1631/FITEE.1800312

RIGHTS & PERMISSIONS

2019 Zhejiang University and Springer-Verlag GmbH Germany, part of Springer Nature
PDF(1553 KB)

Accesses

Citations

Detail

Sections
Recommended

/