Title
Differential Power Analysis of HMAC SHA-1 and HMAC SHA-2 in the Hamming Weight Model.
Abstract
As any algorithm manipulating secret data, HMAC is potentially vulnerable to side channel attacks. In 2004, Lemke et al. fully described a differential power attack on HMAC with RIPEMD-160 in the Hamming weight leakage model, and mentioned a possible extension to SHA-1. Later in 2007, McEvoy et al. proposed an attack against HMAC with hash functions from the SHA-2 family, that works in the Hamming distance leakage model. This attack makes strong assumptions on the target implementation. In this paper, we present an attack on HMAC SHA-2 in the Hamming weight leakage model, which advantageously can be used when no information is available on the targeted implementation. Furthermore, we give a full description of an extension of this attack to HMAC SHA-1. We also provide a careful study of the protections to develop in order to minimize the impact of the security on the performances.
Year
DOI
Venue
2014
10.1007/978-3-319-25915-4_19
Communications in Computer and Information Science
Keywords
Field
DocType
HMAC,Side channel analysis,Differential power analysis,Hamming weight,SHA-1,SHA-2
SHA-2,Hash-based message authentication code,Power analysis,SHA-1,Computer science,Arithmetic,Knowledge management,Hamming distance,Hash function,Side channel attack,Hamming weight
Conference
Volume
ISSN
Citations 
554
1865-0929
0
PageRank 
References 
Authors
0.34
0
5
Name
Order
Citations
PageRank
Sonia Belaïd1332.23
Luk Bettale21117.18
Emmanuelle Dottax323214.48
Laurie Genelle4623.35
Franck Rondepierre541.41