Power analysis attack of HMAC based on SM3

The current power analysis attack of HMAC based on SM3 applies only to the object,on which there is the Hamming weight and Hamming distance information leakage at the same time.there is only a single information leakage mode on the attack object,then the attack methods don't work.To solve the l...

Full description

Saved in:
Bibliographic Details
Main Authors: Zhi-bo DU, Zhen WU, Min WANG, Jin-tao RAO
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2016-05-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/0.11959/j.issn.1000-436x.2016090/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539550148558848
author Zhi-bo DU
Zhen WU
Min WANG
Jin-tao RAO
author_facet Zhi-bo DU
Zhen WU
Min WANG
Jin-tao RAO
author_sort Zhi-bo DU
collection DOAJ
description The current power analysis attack of HMAC based on SM3 applies only to the object,on which there is the Hamming weight and Hamming distance information leakage at the same time.there is only a single information leakage mode on the attack object,then the attack methods don't work.To solve the limitations of the current attack methods,a novel method of the power analysis attack of HMAC based on SM3 was proposed.The different attack object and their related va-riables were selected in each power analysis attack.The attacks were implemented according to the Hamming distance mod-el or Hamming weight model of the intermediate variables.After several power analysis attacked on the first four rounds of SM3,the equations that consists of the results proposed of all the power analysis attacks were obtained.The ultimate attack object is derived by getting the solution of the equations.The experimental results show that the oposed attack method was effective.The method can be used universally because its being available for both the situation of co-exist of hamming weight with Hamming distance,and that of either the Hamming weight or choosing the Hamming distance model existence.
format Article
id doaj-art-01acab99d0a44162b85a59348ca9d3d0
institution Kabale University
issn 1000-436X
language zho
publishDate 2016-05-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-01acab99d0a44162b85a59348ca9d3d02025-01-14T06:55:20ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2016-05-0137384359700796Power analysis attack of HMAC based on SM3Zhi-bo DUZhen WUMin WANGJin-tao RAOThe current power analysis attack of HMAC based on SM3 applies only to the object,on which there is the Hamming weight and Hamming distance information leakage at the same time.there is only a single information leakage mode on the attack object,then the attack methods don't work.To solve the limitations of the current attack methods,a novel method of the power analysis attack of HMAC based on SM3 was proposed.The different attack object and their related va-riables were selected in each power analysis attack.The attacks were implemented according to the Hamming distance mod-el or Hamming weight model of the intermediate variables.After several power analysis attacked on the first four rounds of SM3,the equations that consists of the results proposed of all the power analysis attacks were obtained.The ultimate attack object is derived by getting the solution of the equations.The experimental results show that the oposed attack method was effective.The method can be used universally because its being available for both the situation of co-exist of hamming weight with Hamming distance,and that of either the Hamming weight or choosing the Hamming distance model existence.http://www.joconline.com.cn/zh/article/doi/0.11959/j.issn.1000-436x.2016090/HAMC algorithmSM3 algorithmpower analysis attackcorrelation power analysis attackinitial state
spellingShingle Zhi-bo DU
Zhen WU
Min WANG
Jin-tao RAO
Power analysis attack of HMAC based on SM3
Tongxin xuebao
HAMC algorithm
SM3 algorithm
power analysis attack
correlation power analysis attack
initial state
title Power analysis attack of HMAC based on SM3
title_full Power analysis attack of HMAC based on SM3
title_fullStr Power analysis attack of HMAC based on SM3
title_full_unstemmed Power analysis attack of HMAC based on SM3
title_short Power analysis attack of HMAC based on SM3
title_sort power analysis attack of hmac based on sm3
topic HAMC algorithm
SM3 algorithm
power analysis attack
correlation power analysis attack
initial state
url http://www.joconline.com.cn/zh/article/doi/0.11959/j.issn.1000-436x.2016090/
work_keys_str_mv AT zhibodu poweranalysisattackofhmacbasedonsm3
AT zhenwu poweranalysisattackofhmacbasedonsm3
AT minwang poweranalysisattackofhmacbasedonsm3
AT jintaorao poweranalysisattackofhmacbasedonsm3