Research on Differential Power Analysis of HMAC-SM3
- DOI
- 10.2991/csic-15.2015.24How to use a DOI?
- Keywords
- HMAC, SM3, Side channel attacks, Differential power analysis
- Abstract
The HMAC algorithm is widely used to provide authentication and message integrity in digital communications. However, if the HMAC cryptographic algorithm is implemented in cryptographic circuit, it is vulnerable to side-channel attacks. A typical example is that in 2007, McEvoy proposed an attack strategy for hardware-based implementation of HMAC-SHA2. In this paper, we research on SM3 cryptographic hash algorithm and propose a DPA attack strategy for the software-based implementation of HMAC-SM3. In the experiment, we launch a successful DPA attack on the practical cryptographic circuit and then discuss the security issues about the software-based implementation of HMAC-SM3.
- Copyright
- © 2015, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Jun Xie AU - Wei Sun AU - Dawu Gu AU - Zheng Guo AU - Junrong Liu AU - Sigang Bao AU - Bo Ma PY - 2015/07 DA - 2015/07 TI - Research on Differential Power Analysis of HMAC-SM3 BT - Proceedings of the 2015 International Conference on Computer Science and Intelligent Communication PB - Atlantis Press SP - 103 EP - 106 SN - 2352-538X UR - https://doi.org/10.2991/csic-15.2015.24 DO - 10.2991/csic-15.2015.24 ID - Xie2015/07 ER -