2007
DOI: 10.1007/978-3-540-77535-5_23
|View full text |Cite
|
Sign up to set email alerts
|

Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures

Abstract: Abstract. The HMAC algorithm is widely used to provide authentication and message integrity to digital communications. However, if the HMAC algorithm is implemented in embedded hardware, it is vulnerable to side-channel attacks. In this paper, we describe a DPA attack strategy for the HMAC algorithm, based on the SHA-2 hash function family. Using an implementation on a commercial FPGA board, we show that such attacks are practical in reality. In addition, we present a masked implementation of the algorithm, wh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
45
0
1

Year Published

2010
2010
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 42 publications
(46 citation statements)
references
References 17 publications
0
45
0
1
Order By: Relevance
“…By observing and analyzing physical information emitted from a cipher chip, an attacker can obtain a secret key inside the cipher circuit. A timing attack [7], a fault analysis attack [8], [9], a cache attack [10], an electromagnetic side-channel attack [11], and a differential power attack [12], [13], [14], [15] are reported as possible side-channel attacks.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…By observing and analyzing physical information emitted from a cipher chip, an attacker can obtain a secret key inside the cipher circuit. A timing attack [7], a fault analysis attack [8], [9], a cache attack [10], an electromagnetic side-channel attack [11], and a differential power attack [12], [13], [14], [15] are reported as possible side-channel attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Differential power analysis based side-channel attacks and electromagnetic side-channel attacks for hash generator circuits are proposed in Refs. [11], [12], [14], [15]. However, as far as we know, scan-based attacks against hash generator circuits have not been proposed yet.…”
Section: Introductionmentioning
confidence: 99%
“…Okeya et al [7] [8] evaluated the security of HMAC algorithm based on block-cipher based hash functions. McEvoy et al [9] discussed a differential sidechannel attack on an implementation of the HMAC algorithm that uses the SHA-2 hash function family. But as far as we know, the resistance of SM3 to side channel attacks still remains uncertain and thus a potential risk for software or hardware implementations.…”
Section: Introductionmentioning
confidence: 99%
“…Okeya et al [7] [8] evaluated the security of HMAC algorithm based on block-cipher based hash functions. McEvoy et al [9] discussed a differential side-channel attack on an implementation of the HMAC algorithm that uses the SHA-2 hash function family. But as far as we know, the resistance of SM3 to side channel attacks still remains uncertain.…”
Section: Introductionmentioning
confidence: 99%