Conference Publication Details
Mandatory Fields
McEvoy, R.P., Tunstall, M., Murphy, C.C., and Marnane, W.P.
Lecture Notes in Computer Science 4867, Proceedings 8th International Workshop on Information Security Applications (WISA 2007)
Differential power analysis of HMAC based on SHA-2, and countermeasures
2007
August
Published
1
()
Optional Fields
317
332
Korea
27-AUG-07
29-AUG-07
The HMAC algorithm is widely used to provide authentication and message integrity to digital communications. However, if the HMAC algorithm is implemented in embedded hardware, it is vulnerable to side-channel attacks. In this paper, we describe a DPA attack strategy for the HMAC algorithm, based on the SHA-2 hash function family. Using an implementation on a commercial FPGA board, we show that such attacks are practical in reality. In addition, we present a masked implementation of the algorithm, which is designed to counteract first-order DPA attacks.
10.1007/978-3-540-77535-5_23
Grant Details