loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Sonia Belaïd 1 ; Luk Bettale 2 ; Emmanuelle Dottax 2 ; Laurie Genelle 2 and Franck Rondepierre 2

Affiliations: 1 École Normale Supérieure and Thales Communications & Security, France ; 2 Oberthur Technologies, France

Keyword(s): Side Channel Analysis, Differential Power Analysis, Hamming Weight, HMAC, SHA-2.

Related Ontology Subjects/Areas/Topics: Applied Cryptography ; Cryptographic Techniques and Key Management ; Data Engineering ; Databases and Data Security ; Information and Systems Security ; Security Engineering ; Security in Information Systems ; Software Security

Abstract: As any algorithm manipulating secret data, HMAC is potentially vulnerable to side channel attacks. In 2007, McEvoy et al. proposed a differential power analysis attack against HMAC instantiated with hash functions from the SHA-2 family. Their attack works in the Hamming distance leakage model and makes strong assumptions on the target implementation. In this paper, we present an attack on HMAC SHA-2 in the Hamming weight leakage model, which advantageously can be used when no information is available on the targeted implementation. Furthermore, our attack can be adapted to the Hamming distance model with weaker assumptions on the implementation. We show the feasibility of our attack on simulations, and we study its overall cost and success rate. We also provide an evaluation of the performance overhead induced by the countermeasures necessary to avoid the attack.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.140.185.147

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Belaïd, S.; Bettale, L.; Dottax, E.; Genelle, L. and Rondepierre, F. (2013). Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model. In Proceedings of the 10th International Conference on Security and Cryptography (ICETE 2013) - SECRYPT; ISBN 978-989-8565-73-0; ISSN 2184-3236, SciTePress, pages 230-241. DOI: 10.5220/0004532702300241

@conference{secrypt13,
author={Sonia Belaïd. and Luk Bettale. and Emmanuelle Dottax. and Laurie Genelle. and Franck Rondepierre.},
title={Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model},
booktitle={Proceedings of the 10th International Conference on Security and Cryptography (ICETE 2013) - SECRYPT},
year={2013},
pages={230-241},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004532702300241},
isbn={978-989-8565-73-0},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the 10th International Conference on Security and Cryptography (ICETE 2013) - SECRYPT
TI - Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model
SN - 978-989-8565-73-0
IS - 2184-3236
AU - Belaïd, S.
AU - Bettale, L.
AU - Dottax, E.
AU - Genelle, L.
AU - Rondepierre, F.
PY - 2013
SP - 230
EP - 241
DO - 10.5220/0004532702300241
PB - SciTePress