Proceedings of the 2015 International Conference on Computer Science and Intelligent Communication

Research on Differential Power Analysis of HMAC-SM3

Authors
Jun Xie, Wei Sun, Dawu Gu, Zheng Guo, Junrong Liu, Sigang Bao, Bo Ma
Corresponding Author
Jun Xie
Available Online July 2015.
DOI
10.2991/csic-15.2015.24How to use a DOI?
Keywords
HMAC, SM3, Side channel attacks, Differential power analysis
Abstract

The HMAC algorithm is widely used to provide authentication and message integrity in digital communications. However, if the HMAC cryptographic algorithm is implemented in cryptographic circuit, it is vulnerable to side-channel attacks. A typical example is that in 2007, McEvoy proposed an attack strategy for hardware-based implementation of HMAC-SHA2. In this paper, we research on SM3 cryptographic hash algorithm and propose a DPA attack strategy for the software-based implementation of HMAC-SM3. In the experiment, we launch a successful DPA attack on the practical cryptographic circuit and then discuss the security issues about the software-based implementation of HMAC-SM3.

Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2015 International Conference on Computer Science and Intelligent Communication
Series
Advances in Computer Science Research
Publication Date
July 2015
ISBN
10.2991/csic-15.2015.24
ISSN
2352-538X
DOI
10.2991/csic-15.2015.24How to use a DOI?
Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Jun Xie
AU  - Wei Sun
AU  - Dawu Gu
AU  - Zheng Guo
AU  - Junrong Liu
AU  - Sigang Bao
AU  - Bo Ma
PY  - 2015/07
DA  - 2015/07
TI  - Research on Differential Power Analysis of HMAC-SM3
BT  - Proceedings of the 2015 International Conference on Computer Science and Intelligent Communication
PB  - Atlantis Press
SP  - 103
EP  - 106
SN  - 2352-538X
UR  - https://doi.org/10.2991/csic-15.2015.24
DO  - 10.2991/csic-15.2015.24
ID  - Xie2015/07
ER  -