Proceedings of the First International Conference on Information Science and Electronic Technology

A First-Order Differential Power Analysis Attack on HMAC-SM3

Authors
Limin Guo, Lihui Wang, Qing Li, Zhimin Zhang, Dan Liu, Weijun Shan
Corresponding Author
Limin Guo
Available Online March 2015.
DOI
https://doi.org/10.2991/iset-15.2015.25How to use a DOI?
Keywords
HMAC, SM3, DPA
Abstract
HMAC algorithm is one of the most famous keyed hash functions, and widely utilized. And SM3 is the only standard hash algorithm of China. However, most cryptographic algorithms implementations are vulnerable against side channel attacks. But specific side channel attacks on HMAC-SM3 have not been given so far. This paper presents a first-order DPA attack on HMAC-SM3. HMAC-SM3 hash algorithm is based on the mixing of different algebraic operations, such as XOR and addition modulo 232, thus the proposed DPA attack is mainly against these basic group operations. Experimental results are given by attacking an implementation of HMAC-SM3 in a smart card, which demonstrate the practicability of such attacks described in this paper.
Open Access
This is an open access article distributed under the CC BY-NC license.

Download article (PDF)

Proceedings
First International Conference on Information Science and Electronic Technology (ISET 2015)
Part of series
Advances in Computer Science Research
Publication Date
March 2015
ISBN
978-94-62520-50-9
DOI
https://doi.org/10.2991/iset-15.2015.25How to use a DOI?
Open Access
This is an open access article distributed under the CC BY-NC license.

Cite this article

TY  - CONF
AU  - Limin Guo
AU  - Lihui Wang
AU  - Qing Li
AU  - Zhimin Zhang
AU  - Dan Liu
AU  - Weijun Shan
PY  - 2015/03
DA  - 2015/03
TI  - A First-Order Differential Power Analysis Attack on HMAC-SM3
BT  - First International Conference on Information Science and Electronic Technology (ISET 2015)
PB  - Atlantis Press
UR  - https://doi.org/10.2991/iset-15.2015.25
DO  - https://doi.org/10.2991/iset-15.2015.25
ID  - Guo2015/03
ER  -