ORIGINAL RESEARCH article

Front. Phys.

Sec. Social Physics

A Side-Channel Attack for Recovering Keys in HMAC-SM3 Algorithm

  • 1. University of Electronic Science and Technology of China, Chengdu, China

  • 2. CHINA MERCHANTS GROUP TESTING & CERTIFICATION (CHONGQING) CO. LTD, Chongqing, China

Article metrics

View details

153

Views

The final, formatted version of the article will be published soon.

Abstract

Cyber-Physical-Social Systems(CPSS) face growing side-channel threats, compromising secure data transmission and authentication. As China's national cryptographic hash standard, SM3 is widely used in these systems for identity and data integrity, yet its key-dependent input vulnerabilities remain insufficiently tackled, particularly those exploitable through side-channel attacks. This study addresses critical limitations of traditional side-channel attacks for HMAC-SM3 key recovery: non-profiling approaches fail due to the absence of exploitable plaintext correlations, while profiling-based methods suffer from error accumulation and achieve extremely low success rates in single-trace scenarios . To overcome these bottlenecks, we propose a novel self-calibrating side-channel attack that enables high-accuracy key input recovery for HMAC-SM3 using only a single power trace. The method constructs a Bayesian network to integrate power consumption trace statistics with prior knowledge of input dependencies, employing belief propagation for joint probabilistic inference. The experimental tests showed that key recovery achieved 100% success under simulated noiseless conditions, a success rate of 91.45% on a real smart card system, and remained 73% effective at a signal-to-noise ratio of 10 dB. This paper identifies new security risks for key-bearing objects in Cyber-Physical-Social Systems and provides theoretical foundations for effective countermeasures.

Summary

Keywords

Bayesian network, cyber-physical-social system, HMAC-SM3, Message expansion, Probabilistic graphical model, self-calibrating side-channel attack

Received

18 August 2025

Accepted

03 February 2026

Copyright

© 2026 Wu, Qin and Wang. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Zhen Wu

Disclaimer

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.

Outline

Share article

Article metrics