Power analysis attack of HMAC based on SM3
The current power analysis attack of HMAC based on SM3 applies only to the object,on which there is the Hamming weight and Hamming distance information leakage at the same time.there is only a single information leakage mode on the attack object,then the attack methods don't work.To solve the l...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2016-05-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/0.11959/j.issn.1000-436x.2016090/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539550148558848 |
---|---|
author | Zhi-bo DU Zhen WU Min WANG Jin-tao RAO |
author_facet | Zhi-bo DU Zhen WU Min WANG Jin-tao RAO |
author_sort | Zhi-bo DU |
collection | DOAJ |
description | The current power analysis attack of HMAC based on SM3 applies only to the object,on which there is the Hamming weight and Hamming distance information leakage at the same time.there is only a single information leakage mode on the attack object,then the attack methods don't work.To solve the limitations of the current attack methods,a novel method of the power analysis attack of HMAC based on SM3 was proposed.The different attack object and their related va-riables were selected in each power analysis attack.The attacks were implemented according to the Hamming distance mod-el or Hamming weight model of the intermediate variables.After several power analysis attacked on the first four rounds of SM3,the equations that consists of the results proposed of all the power analysis attacks were obtained.The ultimate attack object is derived by getting the solution of the equations.The experimental results show that the oposed attack method was effective.The method can be used universally because its being available for both the situation of co-exist of hamming weight with Hamming distance,and that of either the Hamming weight or choosing the Hamming distance model existence. |
format | Article |
id | doaj-art-01acab99d0a44162b85a59348ca9d3d0 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2016-05-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-01acab99d0a44162b85a59348ca9d3d02025-01-14T06:55:20ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2016-05-0137384359700796Power analysis attack of HMAC based on SM3Zhi-bo DUZhen WUMin WANGJin-tao RAOThe current power analysis attack of HMAC based on SM3 applies only to the object,on which there is the Hamming weight and Hamming distance information leakage at the same time.there is only a single information leakage mode on the attack object,then the attack methods don't work.To solve the limitations of the current attack methods,a novel method of the power analysis attack of HMAC based on SM3 was proposed.The different attack object and their related va-riables were selected in each power analysis attack.The attacks were implemented according to the Hamming distance mod-el or Hamming weight model of the intermediate variables.After several power analysis attacked on the first four rounds of SM3,the equations that consists of the results proposed of all the power analysis attacks were obtained.The ultimate attack object is derived by getting the solution of the equations.The experimental results show that the oposed attack method was effective.The method can be used universally because its being available for both the situation of co-exist of hamming weight with Hamming distance,and that of either the Hamming weight or choosing the Hamming distance model existence.http://www.joconline.com.cn/zh/article/doi/0.11959/j.issn.1000-436x.2016090/HAMC algorithmSM3 algorithmpower analysis attackcorrelation power analysis attackinitial state |
spellingShingle | Zhi-bo DU Zhen WU Min WANG Jin-tao RAO Power analysis attack of HMAC based on SM3 Tongxin xuebao HAMC algorithm SM3 algorithm power analysis attack correlation power analysis attack initial state |
title | Power analysis attack of HMAC based on SM3 |
title_full | Power analysis attack of HMAC based on SM3 |
title_fullStr | Power analysis attack of HMAC based on SM3 |
title_full_unstemmed | Power analysis attack of HMAC based on SM3 |
title_short | Power analysis attack of HMAC based on SM3 |
title_sort | power analysis attack of hmac based on sm3 |
topic | HAMC algorithm SM3 algorithm power analysis attack correlation power analysis attack initial state |
url | http://www.joconline.com.cn/zh/article/doi/0.11959/j.issn.1000-436x.2016090/ |
work_keys_str_mv | AT zhibodu poweranalysisattackofhmacbasedonsm3 AT zhenwu poweranalysisattackofhmacbasedonsm3 AT minwang poweranalysisattackofhmacbasedonsm3 AT jintaorao poweranalysisattackofhmacbasedonsm3 |