Title :
A Chosen - Plaintext Differential Power Analysis Attack on HMAC - SM3
Author :
Limin Guo;Lihui Wang;Dan Liu;Weijun Shan;Zhimin Zhang;Qing Li;Jun Yu
Author_Institution :
Shanghai Fudan Microelectron. Group Co., Ltd., Shanghai, China
Abstract :
The HMAC algorithm involves a hash function with a secret key. And SM3 is the only standard hash algorithm of China. HMAC-SM3 algorithm is based on the mixing of different algebraic operations, such as XOR and addition modulo 232, thus the classical side-channel attacks on it are mainly against these basic group operations and need to exploit multiple leakage models. Therefore, the attack procedures are complicated. What´s more, it is difficult to recover the whole inner keyed state if the noise level of the target implementation are relatively high. In this paper, we present a chosen-plaintext differential power analysis attack on HMAC-SM3. The new proposed chosen-plaintext attack method is simply against modulo addition operation and can be easily carried out by collecting power consumption traces four times while certain chosen messages are processed by the target device separately. Experimental results are given using an implementation of HMAC-SM3 algorithm in a smart card.
Keywords :
"Power demand","Algorithm design and analysis","Mathematical model","Cryptography","Standards","Power measurement"
Conference_Titel :
Computational Intelligence and Security (CIS), 2015 11th International Conference on
DOI :
10.1109/CIS.2015.91