Title | ||
---|---|---|
Differential Power Analysis of HMAC SHA-1 and HMAC SHA-2 in the Hamming Weight Model. |
Abstract | ||
---|---|---|
As any algorithm manipulating secret data, HMAC is potentially vulnerable to side channel attacks. In 2004, Lemke et al. fully described a differential power attack on HMAC with RIPEMD-160 in the Hamming weight leakage model, and mentioned a possible extension to SHA-1. Later in 2007, McEvoy et al. proposed an attack against HMAC with hash functions from the SHA-2 family, that works in the Hamming distance leakage model. This attack makes strong assumptions on the target implementation. In this paper, we present an attack on HMAC SHA-2 in the Hamming weight leakage model, which advantageously can be used when no information is available on the targeted implementation. Furthermore, we give a full description of an extension of this attack to HMAC SHA-1. We also provide a careful study of the protections to develop in order to minimize the impact of the security on the performances. |
Year | DOI | Venue |
---|---|---|
2014 | 10.1007/978-3-319-25915-4_19 | Communications in Computer and Information Science |
Keywords | Field | DocType |
HMAC,Side channel analysis,Differential power analysis,Hamming weight,SHA-1,SHA-2 | SHA-2,Hash-based message authentication code,Power analysis,SHA-1,Computer science,Arithmetic,Knowledge management,Hamming distance,Hash function,Side channel attack,Hamming weight | Conference |
Volume | ISSN | Citations |
554 | 1865-0929 | 0 |
PageRank | References | Authors |
0.34 | 0 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Sonia Belaïd | 1 | 33 | 2.23 |
Luk Bettale | 2 | 111 | 7.18 |
Emmanuelle Dottax | 3 | 232 | 14.48 |
Laurie Genelle | 4 | 62 | 3.35 |
Franck Rondepierre | 5 | 4 | 1.41 |