• DocumentCode
    3740239
  • Title

    A Chosen - Plaintext Differential Power Analysis Attack on HMAC - SM3

  • Author

    Limin Guo;Lihui Wang;Dan Liu;Weijun Shan;Zhimin Zhang;Qing Li;Jun Yu

  • Author_Institution
    Shanghai Fudan Microelectron. Group Co., Ltd., Shanghai, China
  • fYear
    2015
  • Firstpage
    350
  • Lastpage
    353
  • Abstract
    The HMAC algorithm involves a hash function with a secret key. And SM3 is the only standard hash algorithm of China. HMAC-SM3 algorithm is based on the mixing of different algebraic operations, such as XOR and addition modulo 232, thus the classical side-channel attacks on it are mainly against these basic group operations and need to exploit multiple leakage models. Therefore, the attack procedures are complicated. What´s more, it is difficult to recover the whole inner keyed state if the noise level of the target implementation are relatively high. In this paper, we present a chosen-plaintext differential power analysis attack on HMAC-SM3. The new proposed chosen-plaintext attack method is simply against modulo addition operation and can be easily carried out by collecting power consumption traces four times while certain chosen messages are processed by the target device separately. Experimental results are given using an implementation of HMAC-SM3 algorithm in a smart card.
  • Keywords
    "Power demand","Algorithm design and analysis","Mathematical model","Cryptography","Standards","Power measurement"
  • Publisher
    ieee
  • Conference_Titel
    Computational Intelligence and Security (CIS), 2015 11th International Conference on
  • Type

    conf

  • DOI
    10.1109/CIS.2015.91
  • Filename
    7397105