Mutual information power analysis attack of HMAC based on SM3
Contents Papers|更新时间:2024-06-05
|
Mutual information power analysis attack of HMAC based on SM3
Journal on CommunicationsVol. 37, Issue Z1, Pages: 57-62(2016)
作者机构:
1. 成都信息工程大学 信息安全工程学院,四川 成都 610225
2. 国网四川省电力公司电力科学研究院,四川 成都 610072
作者简介:
基金信息:
The National Science and Technology Major Project(2014ZX01032401-001);The National High Technology Research and Development Program of China (863 Program)(2012AA01A403);Sichuan Science and Technology Support Programmer(2014GZ0148);Education Department Key Scientific Research Projects of Sichuan Prov-ince(13ZA0091)
Zhen WU, Min WANG, Jin-tao RAO, et al. Mutual information power analysis attack of HMAC based on SM3[J]. Journal on Communications, 2016, 37(Z1): 57-62.
DOI:
Zhen WU, Min WANG, Jin-tao RAO, et al. Mutual information power analysis attack of HMAC based on SM3[J]. Journal on Communications, 2016, 37(Z1): 57-62. DOI: 10.11959/j.issn.1000-436x.2016248.
Mutual information power analysis attack of HMAC based on SM3
A novel method of mutual information power analysis attack was proposed.The method was built on the basis of the basic principle of power analysis and the basic theory of information.For the purpose of attacking the key
the mutual in-formation values was computed using two values between the mediate variable with the power traces.An experiment was im-plemented on the algorithm of HMAC based on SM3 using this method.The experimental results show the proposed attack method is effective because the initial value of state variable can be successfully retrieved to compute the real true key.
关键词
Keywords
references
KOCHER P . Timing attacks on implementAtions of diffie-hellmAn,RSA,DSS,and other systems[C]//CRYPTO 1996 . 1996 : 104 - 113 .
KOCHER P , JAFFE J , JUN B A . Differential power analysis[C]//Proceedings of the 19th AnnuAl InternAtionAl Cryptology Conference on AdvAnces in Cryptology Lecture Notes In Computer Science . 1999 : 388 - 397 .
BRIER E , CLAVIER C , OLIVIER F . Correlation power analysis with a leakage model[C]//CryptogrAphic HArdwAre And Embedded Sys-tems . 2004 : 16 - 29 .
SURESH C , JOSYULA R R , PANKAJ R . Template attacks[C]// Cryp-togrAphic Hardware and Embedded Systems - CHES 2002 . 2003 : 13 - 28 .
GIERLICHS B , BATINA L , TUYLS P , et al . Mutual information analysis [J ] . In CHES 2008,LNCS , 2008 : 426 - 442 .
BELLARE M , CANETTI R , KRAWCZYK H . Keying hash functions for message authentication[C]//CRYPTO . 1996 : 1 - 15 .
China's office of security commercial code administration:sepecifica-tion of sm3 cryptographic hash function (2010) [EB/OL ] . http://www.oscca.gov.cn/UpFile/20101222141857786.pdf http://www.oscca.gov.cn/UpFile/20101222141857786.pdf .
MCEVOY R , TUNSTALL M , COLIN C , et al . Differential power analysis of HMAC based on SHA-2,and countermeasures [J ] . Infor-mation Security ApplicAtions , 2007 : 317 - 332 .
GUO L M , LI Q , WANG L H , et al . A differential power analysis attack on dynamic password token based on SM3 algorithm[C]//First International Conference on Information Science and Electronic Technology (ISET 2015) . 2015 : 107 - 110 .
GUO L M , LI Q , WANG L H , et al . A first-order differential power analysis attack on HMAC-SM3[C]//First International Conference on Information Science and Electronic Technology (ISET 2015) . 2015 : 94 - 97 .
WU Z , CHEN Y , CHEN J , et al . Exponential information's extraction from power traces of modulo exponentiation implemented on FPGA [J ] . Journal on Communications , 2010 , 31 ( 2 ): 17 - 21 .
WANG M , DU Z B , WU Z , et al . Chosen-plaintext power analysis at-tack against SMS4 with the round-output as the intermediate data [J ] . Journal on Communications , 2015 , 36 ( 1 ): 2015016 .