2009 | OriginalPaper | Buchkapitel
Practical Electromagnetic Template Attack on HMAC
verfasst von : Pierre-Alain Fouque, Gaëtan Leurent, Denis Réal, Frédéric Valette
Erschienen in: Cryptographic Hardware and Embedded Systems - CHES 2009
Verlag: Springer Berlin Heidelberg
Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.
Wählen Sie Textabschnitte aus um mit Künstlicher Intelligenz passenden Patente zu finden. powered by
Markieren Sie Textabschnitte, um KI-gestützt weitere passende Inhalte zu finden. powered by
In this paper, we show a very efficient side channel attack against HMAC. Our attack assumes the presence of a side channel that reveals the Hamming distance of some registers. After a
profiling phase
in which the adversary has access to a device and can configure it, the attack recovers the secret key by monitoring a
single execution
of HMAC-SHA-1. The secret key can be recovered using a “template attack” with a computation of about 2
32
3
κ
compression functions, where
κ
is the number of 32-bit words of the key. Finally, we show that our attack can also be used to break the secrecy of network protocols usually implemented on embedded devices.
We have performed experiments using a NIOS processor executed on a Field Programmable Gate Array (FPGA) to confirm the leakage model. We hope that our results shed some light on the requirements in term of side channel attack for the future SHA-3 function.