Proceedings of the First International Conference on Information Science and Electronic Technology 2015
DOI: 10.2991/iset-15.2015.25
|View full text |Cite
|
Sign up to set email alerts
|

A First-Order Differential Power Analysis Attack on HMAC-SM3

Abstract: Abstract-HMAC algorithm is one of the most famous keyed hash functions, and widely utilized. And SM3 is the only standard hash algorithm of China. However, most cryptographic algorithms implementations are vulnerable against side channel attacks. But specific side channel attacks on HMAC-SM3 have not been given so far. This paper presents a first-order DPA attack on HMAC-SM3. HMAC-SM3 hash algorithm is based on the mixing of different algebraic operations, such as XOR and addition modulo 2 32 , thus the propos… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…Joe et al (2015) presented a study entitled "Analysis of first-order attacks on HMAC." Given the identification of PIA and MAC blocks, the author has analyzed the possible attacks on HMAC [2]. Momeni and Taheri (2016) presented a study entitled "Time analysis attack on stream cipher algorithm."…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Joe et al (2015) presented a study entitled "Analysis of first-order attacks on HMAC." Given the identification of PIA and MAC blocks, the author has analyzed the possible attacks on HMAC [2]. Momeni and Taheri (2016) presented a study entitled "Time analysis attack on stream cipher algorithm."…”
Section: Literature Reviewmentioning
confidence: 99%
“…Given the conducted studies, some attacks have been made on HMAC in recent years, which could compromise the security of this widely used function [1,2,3,4]. However, the attacks made were mostly due to the weakness in cryptography key used.…”
Section: Introductionmentioning
confidence: 99%
“…Nonetheless, this does not mean that HMAC is obsolete and its use does not have any effect on increasing security, but its algorithm trend has to be modified or improved. Considering the examination of the attacks on HMAC, generally, due to the weakness of the private HMAC key or the hash function used in this algorithm [6,7], some papers have been written to increase the security of HMAC key or using valid hash algorithms to increase HMAC security [8 and 9].…”
Section: Explainimentioning
confidence: 99%