
FOLLOWUS
Institute of Microelectronics, Tsinghua University, Beijing 100084, China
National Laboratory for Information Science and Technology, Tsinghua University, Beijing 100084, China
State Key Laboratory of Cryptography, Beijing 100094, China
[ "Ye YUAN, E-mail: yuan-y15@mails.tsinghua.edu.cn" ]
Kai-ge QU, E-mail: kaigequ@gmail.com
Li-ji WU, E-mail: lijiwu@tsinghua.edu.cn
[ "Xiang-min ZHANG, E-mail: zhxm@mail.tsinghua.edu.cn" ]
收稿:2018-05-19,
修回:2019-;7-12,
纸质出版:2019-07
Scan QR Code
袁野, 曲凯歌, 乌力吉, 等. 针对一种基于SM3算法的消息验证码的相关能量攻击[J]. 信息与电子工程前沿(英文), 2019,20(7):930-945.
Ye YUAN, Kai-ge QU, Li-ji WU, et al. Correlation power attack on a message authentication code based on SM3[J]. Frontiers of Information Technology & Electronic Engineering, 2019, 20(7): 930-945.
袁野, 曲凯歌, 乌力吉, 等. 针对一种基于SM3算法的消息验证码的相关能量攻击[J]. 信息与电子工程前沿(英文), 2019,20(7):930-945. DOI: 10.1631/FITEE.1800312.
Ye YUAN, Kai-ge QU, Li-ji WU, et al. Correlation power attack on a message authentication code based on SM3[J]. Frontiers of Information Technology & Electronic Engineering, 2019, 20(7): 930-945. DOI: 10.1631/FITEE.1800312.
基于哈希函数的消息验证码(HMAC)被广泛应用于身份认证和消息完整性领域。SM3函数作为中国的哈希函数在国内具有很高市场价值。基于SM3的HMAC(HMAC-SM3)侧信道安全性依旧处于被评估阶段,尤其在硬件实现下的侧信道安全性更具研究价值。在硬件实现下,存储在寄存器的中间值有明显的汉明距离泄漏。此外,SM3算法结构决定了HMAC-SM3侧信道分析难度。针对HMAC-SM3的硬件实现,提出一种技巧性的基于比特值的选择明文相关能量攻击策略。在一款现场可编程门阵列(FPGA)开发板上进行实际攻击实验。实验结果表明,利用所提选择明文攻击策略,可从2256的密钥猜测空间中恢复正确密钥。
Hash-based message authentication code (HMAC) is widely used in authentication and message integrity. As a Chinese hash algorithm
the SM3 algorithm is gradually winning domestic market value in China. The side channel security of HMAC based on SM3 (HMAC-SM3) is still to be evaluated
especially in hardware implementation
where only intermediate values stored in registers have apparent Hamming distance leakage. In addition
the algorithm structure of SM3 determines the difficulty in HMAC-SM3 side channel analysis. In this paper
a skillful bit-wise chosen-plaintext correlation power attack procedure is proposed for HMAC-SM3 hardware implementation. Real attack experiments on a field programmable gate array (FPGA) board have been performed. Experimental results show that we can recover the key from the hypothesis space of
$$2^{256}$$
based on the proposed procedure.
S Belad , , , L Bettale , , , E Dottax , , , 等 . . Differential power analysis of HMAC SHA-1 and HMAC SHA-2 in the Hamming weight model . . In: Obaidat MS, Holzinger A, Filipe J (Eds.), E-Business and Telecommunications. Springer, Cham , , 2015 . . p.363 - - 379 . . DOI: 10.1007/978-3-319-25915-4_19 http://doi.org/10.1007/978-3-319-25915-4_19 . .
M Bellare , , , R Canetti , , , H Krawczyk . . Keying hash functions for message authentication . . Int Cryptology Conf on Advances in Cryptology , , 1996 . . p.1 - - 15 . . DOI: 10.1007/3-540-68697-5_1 http://doi.org/10.1007/3-540-68697-5_1 . .
E Brier , , , C Clavier , , , F Olivier . . Correlation power analysis with a leakage model . . In: Joye M, Quisquater JJ (Eds.), Cryptographic Hardware and Embedded Systems. Springer Berlin Heidelberg , , 2004 . . p.16 - - 29 . . DOI: 10.1007/978-3-540-28632-5_2 http://doi.org/10.1007/978-3-540-28632-5_2 . .
DW Ding , , , XW Gao . . Design and implementation of SM3 algorithm on FPGA . . Microcomp Appl , , 2012 . . 31 ( ( 5 ): ): 26 - - 28 . . DOI: 10.3969/j.issn.1674-7720.2012.05.009 http://doi.org/10.3969/j.issn.1674-7720.2012.05.009 . .
FIPS . . The Keyed-Hash Message Authentication Code (HMAC) . . Federal Information Processing Standards Publication, Gaithersburg, MD, USA , , 2002 . . .
LM Guo , , , LH Wang , , , D Liu , , , 等 . . A chosen-plaintext differential power analysis attack on HMAC-SM3 . . 11 th Int Conf on Computational Intelligence and Security , , 2015 . . p.350 - - 353 . . DOI: 10.1109/CIS.2015.91 http://doi.org/10.1109/CIS.2015.91 . .
P Kocher , , , J Jaffe , , , B Jun . . Differential power analysis . . In: Wiener M (Ed.), Advances in Cryptology. Springer Berlin Heidelberg , , 1999 . . p.388 - - 397 . . DOI: 10.1007/3-540-48405-1_25 http://doi.org/10.1007/3-540-48405-1_25 . .
ZB Liu , , , Y Ma , , , JW Jing , , , 等 . . Implementation of SM3 HASH function on FPGA . . Netinfo Secur , , 2011 . . 9 191 - - 193, 218 . . DOI: 10.3969/j.issn.1671-1122.2011.09.059 http://doi.org/10.3969/j.issn.1671-1122.2011.09.059 . .
Y Ma , , , LN Xia , , , JQ Lin , , , 等 . . Hardware performance optimization and evaluation of SM3 hash algorithm on FPGA . . 14 th Int Cryptology Conf on Information and Communications Security , , 2012 . . p.105 - - 118 . . DOI: 10.1007/978-3-642-34129-8_10 http://doi.org/10.1007/978-3-642-34129-8_10 . .
R McEvoy , , , M Tunstall , , , CC Murphy , , , 等 . . Differential power analysis of HMAC based on SHA-2, and countermeasures . . 8 th Int Conf on Information Security Applications , , 2007 . . p.317 - - 332 . . DOI: 10.1007/978-3-540-77535-5_23 http://doi.org/10.1007/978-3-540-77535-5_23 . .
A Menezes , , , PC van Oorschot , , , S Vanstone . . Hash functions and data integrity . . In: Handbook of Applied Cryptography. CRC Press, Boca Raton, USA , , 1996 . . p.321 - - 376 . . . .
A Moradi , , , A Barenghi , , , T Kasper , , , 等 . . On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from Xilinx Virtex-Ⅱ FPGAs . . Proc 18 th ACM Conf on Computer and Communications Security , , 2011 . . p.111 - - 124 . . DOI: 10.1145/2046707.2046722 http://doi.org/10.1145/2046707.2046722 . .
KG Qu , , , W An , , , LJ Wu , , , 等 . . A novel masking scheme for SM3 based MAC . . China Commun , , 2015 . . 12 ( ( 6 ): ): 12 - - 21 . . DOI: 10.1109/CC.2015.7122475 http://doi.org/10.1109/CC.2015.7122475 . .
SCA . . SM3 Cryptographic Hash Algorithm . . State Cryptography Administration of China , , 2010 . . .
W Sun , , , JR Liu , , , DW Gu , , , 等 . . Research on power analysis against software-based and hardware-based cryptographic circuits . . Int Conf on Computer Science and Communication Engineering , , 2015 . . p.1 - - 8 . . . .
M Tunstall , , , N Hanley , , , RP McEvoy , , , 等 . . Correlation power analysis of large word sizes . . IET Irish Signals and Systems Conf , , 2007 . . p.13 - - 14 . . . .
XY Wang , , , XW Yang . . Optimization design and implementation of SM3 algorithm based on FPGA . . Comput Eng , , 2012 . . 38 ( ( 6 ): ): 244 - - 246 . . DOI: 10.3969/j.issn.1000-3428.2012.06.081 http://doi.org/10.3969/j.issn.1000-3428.2012.06.081 . .
关联资源
相关文章
相关作者
相关机构
京公网安备11010802024621