Differential power analysis of dynamic password token based on SM3 algorithm, and countermeasures

被引:2
|
作者
Guo, Limin [1 ]
Wang, Lihui [1 ]
Li, Qing [1 ,2 ]
Yu, Jun [1 ,2 ]
Luo, Peng [3 ]
机构
[1] Shanghai Fudan Microelect Grp Co Ltd, Shanghai, Peoples R China
[2] Fudan Univ, State Key Lab ASIC & Syst, Shanghai, Peoples R China
[3] Commercial Cryptog Testing Ctr, Beijing, Peoples R China
来源
2015 11TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS) | 2015年
关键词
SM3; dynamic password token; differential power analysis; countermeasure; SIDE CHANNEL ATTACKS;
D O I
10.1109/CIS.2015.92
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Dynamic password technology is widely utilized for identity authentication, which depends on using hash functions, such as SM3. And SM3 hash algorithm is based on the mixing of different group operations, such as XOR and addition modulo 2(32). In this paper, we present two original first-order differential power analysis attacks on dynamic password token based on SM3 algorithm. The two proposed DPA attacks are against XOR and addition modulo 232 operation respectively. Experimental results show that dynamic password token based on SM3 algorithm is vulnerable to side channel attacks, no matter implemented in software or hardware. We also provide a masked implementation of the algorithm, which is designed to avoid those proposed attacks.
引用
收藏
页码:354 / 357
页数:4
相关论文
共 15 条
  • [1] A Differential Power Analysis Attack on Dynamic Password Token Based On SM3 Algorithm
    Guo, Limin
    Li, Qing
    Wang, Lihui
    Zhang, Zhimin
    Liu, Dan
    Shan, Weijun
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND ELECTRONIC TECHNOLOGY, 2015, 3 : 107 - 110
  • [2] Research on Differential Power Analysis of HMAC-SM3
    Xie Jun
    Sun Wei
    Gu Dawu
    Guo Zheng
    Liu Junrong
    Bao Sigang
    Ma Bo
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENT COMMUNICATION, 2015, 16 : 103 - 106
  • [3] Differential Power Analysis Attack and Efficient Countermeasures on PRESENT
    Duan, Xiaoyi
    Cui, Qi
    Wang, Sixiang
    Fang, Huawei
    She, Gaojian
    PROCEEDINGS OF 2016 8TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN 2016), 2016, : 8 - 12
  • [4] A chosen - plaintext differential power analysis attack on HMAC-SM3
    Guo, Limin
    Wang, Lihui
    Liu, Dan
    Shan, Weijun
    Zhang, Zhimin
    Li, Qing
    Yu, Jun
    2015 11TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2015, : 350 - 353
  • [5] Differential Power Analysis Attack and Countermeasures on MCrypton
    Wang, Sixiang
    Cui, Qi
    Gao, Xianwei
    Zhang, Lei
    Duan, Xiaoyi
    PROCEEDINGS OF 2016 IEEE ADVANCED INFORMATION MANAGEMENT, COMMUNICATES, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IMCEC 2016), 2016, : 167 - 172
  • [6] Countermeasures against differential power analysis for hyperelliptic curve cryptosystems
    Avanzi, RM
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS CHES 2003, PROCEEDINGS, 2003, 2779 : 366 - 381
  • [7] A First-Order Differential Power Analysis Attack on HMAC-SM3
    Guo, Limin
    Wang, Lihui
    Li, Qing
    Zhang, Zhimin
    Liu, Dan
    Shan, Weijun
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND ELECTRONIC TECHNOLOGY, 2015, 3 : 94 - 97
  • [8] Differential power analysis on countermeasures using binary signed digit representations
    Kim, Tae Hyun
    Han, Dong-Guk
    Okeya, Katsuyuki
    Lim, Jongin
    ETRI JOURNAL, 2007, 29 (05) : 619 - 632
  • [9] Efficient Framework for Genetic Algorithm-Based Correlation Power Analysis
    Wang, An
    Li, Yuan
    Ding, Yaoling
    Zhu, Liehuang
    Wang, Yongjuan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 4882 - 4894
  • [10] Ridge-Based DPA: Improvement of Differential Power Analysis For Nanoscale Chips
    Wang, Weijia
    Yu, Yu
    Standaert, Francois-Xavier
    Liu, Junrong
    Guo, Zheng
    Gu, Dawu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (05) : 1301 - 1316