Deep Learning-based Side Channel Attack on HMAC SM3

SM3 is a Chinese hash standard. HMAC SM3 uses a secret key to encrypt the input text and gives an output as the HMAC of the input text. If the key is recovered, adversaries can easily forge a valid HMAC. We can choose different methods, such as traditional side channel analysis, template attack-base...

Full description

Bibliographic Details
Main Authors: Xin Jin, Yong Xiao, Shiqi Li, Suying Wang
Format: Article
Language:English
Published: Universidad Internacional de La Rioja (UNIR) 2021-03-01
Series:International Journal of Interactive Multimedia and Artificial Intelligence
Subjects:
Online Access:https://www.ijimai.org/journal/bibcite/reference/2841
id doaj-4a01ae57d82843b6af413cc7c5f75db2
record_format Article
spelling doaj-4a01ae57d82843b6af413cc7c5f75db22021-03-03T22:41:42ZengUniversidad Internacional de La Rioja (UNIR)International Journal of Interactive Multimedia and Artificial Intelligence1989-16601989-16602021-03-016411312010.9781/ijimai.2020.11.007ijimai.2020.11.007Deep Learning-based Side Channel Attack on HMAC SM3Xin JinYong XiaoShiqi LiSuying WangSM3 is a Chinese hash standard. HMAC SM3 uses a secret key to encrypt the input text and gives an output as the HMAC of the input text. If the key is recovered, adversaries can easily forge a valid HMAC. We can choose different methods, such as traditional side channel analysis, template attack-based side channel analysis to recover the secret key. Deep Learning has recently been introduced as a new alternative to perform Side-Channel analysis. In this paper, we try to recover the secret key with deep learning-based side channel analysis. We should train the network recursively for different parameters by using the same dataset and attack the target dataset with the trained network to recover different parameters. The experiment results show that the secret key can be recovered with deep learning-based side channel analysis. This work demonstrates the interests of this new method and show that this attack can be performed in practice.https://www.ijimai.org/journal/bibcite/reference/2841convolution neural networkhmacside channel analysis
collection DOAJ
language English
format Article
sources DOAJ
author Xin Jin
Yong Xiao
Shiqi Li
Suying Wang
spellingShingle Xin Jin
Yong Xiao
Shiqi Li
Suying Wang
Deep Learning-based Side Channel Attack on HMAC SM3
International Journal of Interactive Multimedia and Artificial Intelligence
convolution neural network
hmac
side channel analysis
author_facet Xin Jin
Yong Xiao
Shiqi Li
Suying Wang
author_sort Xin Jin
title Deep Learning-based Side Channel Attack on HMAC SM3
title_short Deep Learning-based Side Channel Attack on HMAC SM3
title_full Deep Learning-based Side Channel Attack on HMAC SM3
title_fullStr Deep Learning-based Side Channel Attack on HMAC SM3
title_full_unstemmed Deep Learning-based Side Channel Attack on HMAC SM3
title_sort deep learning-based side channel attack on hmac sm3
publisher Universidad Internacional de La Rioja (UNIR)
series International Journal of Interactive Multimedia and Artificial Intelligence
issn 1989-1660
1989-1660
publishDate 2021-03-01
description SM3 is a Chinese hash standard. HMAC SM3 uses a secret key to encrypt the input text and gives an output as the HMAC of the input text. If the key is recovered, adversaries can easily forge a valid HMAC. We can choose different methods, such as traditional side channel analysis, template attack-based side channel analysis to recover the secret key. Deep Learning has recently been introduced as a new alternative to perform Side-Channel analysis. In this paper, we try to recover the secret key with deep learning-based side channel analysis. We should train the network recursively for different parameters by using the same dataset and attack the target dataset with the trained network to recover different parameters. The experiment results show that the secret key can be recovered with deep learning-based side channel analysis. This work demonstrates the interests of this new method and show that this attack can be performed in practice.
topic convolution neural network
hmac
side channel analysis
url https://www.ijimai.org/journal/bibcite/reference/2841
work_keys_str_mv AT xinjin deeplearningbasedsidechannelattackonhmacsm3
AT yongxiao deeplearningbasedsidechannelattackonhmacsm3
AT shiqili deeplearningbasedsidechannelattackonhmacsm3
AT suyingwang deeplearningbasedsidechannelattackonhmacsm3
_version_ 1724232561672060928