Correlation power attack on amessage authentication code based on SM3

Ye YUAN , Kai-ge QU , Li-ji WU , Jia-wei MA , Xiang-min ZHANG

Front. Inform. Technol. Electron. Eng ›› 2019, Vol. 20 ›› Issue (7) : 930 -945.

PDF (1553KB)
Front. Inform. Technol. Electron. Eng ›› 2019, Vol. 20 ›› Issue (7) : 930 -945. DOI: 10.1631/FITEE.1800312
Orginal Article
Orginal Article

Correlation power attack on amessage authentication code based on SM3

Author information +
History +
PDF (1553KB)

Abstract

Hash-based message authentication code (HMAC) is widely used in authentication and message integrity. As a Chinese hash algorithm, the SM3 algorithm is gradually winning domestic market value in China. The side channel security of HMAC based on SM3 (HMAC-SM3) is still to be evaluated, especially in hardware implementation, where only intermediate values stored in registers have apparent Hamming distance leakage. In addition, the algorithm structure of SM3 determines the difficulty in HMAC-SM3 side channel analysis. In this paper, a skillful bit-wise chosen-plaintext correlation power attack procedure is proposed for HMAC-SM3 hardware implementation. Real attack experiments on a field programmable gate array (FPGA) board have been performed. Experimental results show that we can recover the key from the hypothesis space of 2256 based on the proposed procedure.

Keywords

HMAC-SM3 / Side channel analysis / Correlation power attack / Bit-wise chosen-plaintext

Cite this article

Download citation ▾
Ye YUAN, Kai-ge QU, Li-ji WU, Jia-wei MA, Xiang-min ZHANG. Correlation power attack on amessage authentication code based on SM3. Front. Inform. Technol. Electron. Eng, 2019, 20(7): 930-945 DOI:10.1631/FITEE.1800312

登录浏览全文

4963

注册一个新账户 忘记密码

References

RIGHTS & PERMISSIONS

Zhejiang University and Springer-Verlag GmbH Germany, part of Springer Nature

AI Summary AI Mindmap
PDF (1553KB)

Supplementary files

Supplementary Material 1

Supplementary Material 2

1719

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/