Journal Home Online First Current Issue Archive For Authors Journal Information 中文版

Frontiers of Information Technology & Electronic Engineering >> 2019, Volume 20, Issue 7 doi: 10.1631/FITEE.1800312

Correlation power attack on amessage authentication code based on SM3

1. Institute of Microelectronics, Tsinghua University, Beijing 100084, China
2. National Laboratory for Information Science and Technology, Tsinghua University, Beijing 100084, China
3. State Key Laboratory of Cryptography, Beijing 100094, China

Available online: 2019-08-30

Next Previous

Abstract

Hash-based message authentication code (HMAC) is widely used in authentication and message integrity. As a Chinese hash algorithm, the SM3 algorithm is gradually winning domestic market value in China. The side channel security of HMAC based on SM3 (HMAC-SM3) is still to be evaluated, especially in hardware implementation, where only intermediate values stored in registers have apparent Hamming distance leakage. In addition, the algorithm structure of SM3 determines the difficulty in HMAC-SM3 side channel analysis. In this paper, a skillful bit-wise chosen-plaintext correlation power attack procedure is proposed for HMAC-SM3 hardware implementation. Real attack experiments on a field programmable gate array (FPGA) board have been performed. Experimental results show that we can recover the key from the hypothesis space of 2256 based on the proposed procedure.

Related Research