Security Analysis of HMAC/NMAC by Using Fault Injection
In Choukri and Tunstall (2005), the authors showed that if they decreased the number of rounds in AES by injecting faults, it is possible to recover the secret key. In this paper, we propose fault injection attacks on HMAC/NMAC by applying the main idea of their attack. These attacks are applicable...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2013-01-01
|
Series: | Journal of Applied Mathematics |
Online Access: | http://dx.doi.org/10.1155/2013/101907 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832550964606795776 |
---|---|
author | Kitae Jeong Yuseop Lee Jaechul Sung Seokhie Hong |
author_facet | Kitae Jeong Yuseop Lee Jaechul Sung Seokhie Hong |
author_sort | Kitae Jeong |
collection | DOAJ |
description | In Choukri and Tunstall (2005), the authors showed that if they decreased the number of rounds in AES by injecting faults, it is possible to recover the secret key. In this paper, we propose fault injection attacks on HMAC/NMAC by applying the main idea of their attack. These attacks are applicable to HMAC/NMAC based on the MD-family hash functions and can recover the secret key with the negligible computational complexity. Particularly, these results on HMAC/NMAC-SHA-2 are the first known key recovery attacks so far. |
format | Article |
id | doaj-art-3b1dfe5fe446467ea00b6d03248dc641 |
institution | Kabale University |
issn | 1110-757X 1687-0042 |
language | English |
publishDate | 2013-01-01 |
publisher | Wiley |
record_format | Article |
series | Journal of Applied Mathematics |
spelling | doaj-art-3b1dfe5fe446467ea00b6d03248dc6412025-02-03T06:05:22ZengWileyJournal of Applied Mathematics1110-757X1687-00422013-01-01201310.1155/2013/101907101907Security Analysis of HMAC/NMAC by Using Fault InjectionKitae Jeong0Yuseop Lee1Jaechul Sung2Seokhie Hong3Center for Information Security Technologies (CIST), Korea University, Anam-dong, Seongbuk-gu, Seoul 136-713, Republic of KoreaCenter for Information Security Technologies (CIST), Korea University, Anam-dong, Seongbuk-gu, Seoul 136-713, Republic of KoreaDepartment of Mathematics, University of Seoul, Jeonnong-dong, Dongdaemun-gu, Seoul 130-743, Republic of KoreaCenter for Information Security Technologies (CIST), Korea University, Anam-dong, Seongbuk-gu, Seoul 136-713, Republic of KoreaIn Choukri and Tunstall (2005), the authors showed that if they decreased the number of rounds in AES by injecting faults, it is possible to recover the secret key. In this paper, we propose fault injection attacks on HMAC/NMAC by applying the main idea of their attack. These attacks are applicable to HMAC/NMAC based on the MD-family hash functions and can recover the secret key with the negligible computational complexity. Particularly, these results on HMAC/NMAC-SHA-2 are the first known key recovery attacks so far.http://dx.doi.org/10.1155/2013/101907 |
spellingShingle | Kitae Jeong Yuseop Lee Jaechul Sung Seokhie Hong Security Analysis of HMAC/NMAC by Using Fault Injection Journal of Applied Mathematics |
title | Security Analysis of HMAC/NMAC by Using Fault Injection |
title_full | Security Analysis of HMAC/NMAC by Using Fault Injection |
title_fullStr | Security Analysis of HMAC/NMAC by Using Fault Injection |
title_full_unstemmed | Security Analysis of HMAC/NMAC by Using Fault Injection |
title_short | Security Analysis of HMAC/NMAC by Using Fault Injection |
title_sort | security analysis of hmac nmac by using fault injection |
url | http://dx.doi.org/10.1155/2013/101907 |
work_keys_str_mv | AT kitaejeong securityanalysisofhmacnmacbyusingfaultinjection AT yuseoplee securityanalysisofhmacnmacbyusingfaultinjection AT jaechulsung securityanalysisofhmacnmacbyusingfaultinjection AT seokhiehong securityanalysisofhmacnmacbyusingfaultinjection |