Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model

Sonia Belaid 1, 2, 3 Luk Bettale 4 Emmanuelle Dottax 4 Laurie Genelle 4 Franck Rondepierre 4
1 CASCADE - Construction and Analysis of Systems for Confidentiality and Authenticity of Data and Entities
DI-ENS - Département d'informatique de l'École normale supérieure, Inria Paris-Rocquencourt, CNRS - Centre National de la Recherche Scientifique : UMR 8548
Abstract : As any algorithm manipulating secret data, HMAC is potentially vulnerable to side channel attacks. In 2007, McEvoy et al. proposed a differential power analysis attack against HMAC instantiated with hash functions from the SHA-2 family. Their attack works in the Hamming distance leakage model and makes strong assumptions on the target implementation. In this paper, we present an attack on HMAC SHA-2 in the Hamming weight leakage model, which advantageously can be used when no information is available on the targeted implementation. Furthermore, our attack can be adapted to the Hamming distance model with weaker assumptions on the implementation. We show the feasibility of our attack on simulations, and we study its overall cost and success rate. We also provide an evaluation of the performance overhead induced by the countermeasures necessary to avoid the attack.
Type de document :
Communication dans un congrès
SECRYPT 2013 - 10th International Conference on Security and Cryptography, Jul 2013, Reykjavik, Iceland. Scitepress, 2013
Liste complète des métadonnées

Littérature citée [19 références]  Voir  Masquer  Télécharger

https://hal.inria.fr/hal-00872410
Contributeur : Sonia Belaid <>
Soumis le : samedi 12 octobre 2013 - 14:28:28
Dernière modification le : vendredi 25 mai 2018 - 12:02:05
Document(s) archivé(s) le : lundi 13 janvier 2014 - 04:25:27

Fichier

articleHMAC.pdf
Fichiers produits par l'(les) auteur(s)

Identifiants

  • HAL Id : hal-00872410, version 1

Collections

Citation

Sonia Belaid, Luk Bettale, Emmanuelle Dottax, Laurie Genelle, Franck Rondepierre. Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model. SECRYPT 2013 - 10th International Conference on Security and Cryptography, Jul 2013, Reykjavik, Iceland. Scitepress, 2013. 〈hal-00872410〉

Partager

Métriques

Consultations de la notice

565

Téléchargements de fichiers

310