Paper 2019/346

Yet Another Side Channel Cryptanalysis on SM3 Hash Algorithm

Christophe Clavier, Leo Reynaud, and Antoine Wurcker

Abstract

SM3, the Chinese standard hash algorithm inspired from SHA2, can be attacker by similar means than SHA2 up to an adaptation to its differences. But this kind of attack is based on targeting point of interest of different kinds, some are end of computation results, that are stored when others are in intermediate computational data. The leakage effectiveness of the later could be subject to implementation choices, device type or device type of leakage. In this paper, we propose a new approach that targets only the first kind of intermediate data that are more susceptible to appear. As an example, we targeted the HMAC construction using SM3, where our method allows to recover the first half of the secret information. reducing the security of the HMAC protocol.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
SM3Side-channelHash functionsHMACChosen input
Contact author(s)
wurcker01 @ gmail com
leo reynaud @ unilim fr
christophe clavier @ unilim fr
History
2019-04-03: received
Short URL
https://ia.cr/2019/346
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2019/346,
      author = {Christophe Clavier and Leo Reynaud and Antoine Wurcker},
      title = {Yet Another Side Channel Cryptanalysis on {SM3} Hash Algorithm},
      howpublished = {Cryptology {ePrint} Archive, Paper 2019/346},
      year = {2019},
      url = {https://eprint.iacr.org/2019/346}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.