Security Analysis of HMAC/NMAC by Using Fault Injection

In Choukri and Tunstall (2005), the authors showed that if they decreased the number of rounds in AES by injecting faults, it is possible to recover the secret key. In this paper, we propose fault injection attacks on HMAC/NMAC by applying the main idea of their attack. These attacks are applicable...

Full description

Saved in:
Bibliographic Details
Main Authors: Kitae Jeong, Yuseop Lee, Jaechul Sung, Seokhie Hong
Format: Article
Language:English
Published: Wiley 2013-01-01
Series:Journal of Applied Mathematics
Online Access:http://dx.doi.org/10.1155/2013/101907
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832550964606795776
author Kitae Jeong
Yuseop Lee
Jaechul Sung
Seokhie Hong
author_facet Kitae Jeong
Yuseop Lee
Jaechul Sung
Seokhie Hong
author_sort Kitae Jeong
collection DOAJ
description In Choukri and Tunstall (2005), the authors showed that if they decreased the number of rounds in AES by injecting faults, it is possible to recover the secret key. In this paper, we propose fault injection attacks on HMAC/NMAC by applying the main idea of their attack. These attacks are applicable to HMAC/NMAC based on the MD-family hash functions and can recover the secret key with the negligible computational complexity. Particularly, these results on HMAC/NMAC-SHA-2 are the first known key recovery attacks so far.
format Article
id doaj-art-3b1dfe5fe446467ea00b6d03248dc641
institution Kabale University
issn 1110-757X
1687-0042
language English
publishDate 2013-01-01
publisher Wiley
record_format Article
series Journal of Applied Mathematics
spelling doaj-art-3b1dfe5fe446467ea00b6d03248dc6412025-02-03T06:05:22ZengWileyJournal of Applied Mathematics1110-757X1687-00422013-01-01201310.1155/2013/101907101907Security Analysis of HMAC/NMAC by Using Fault InjectionKitae Jeong0Yuseop Lee1Jaechul Sung2Seokhie Hong3Center for Information Security Technologies (CIST), Korea University, Anam-dong, Seongbuk-gu, Seoul 136-713, Republic of KoreaCenter for Information Security Technologies (CIST), Korea University, Anam-dong, Seongbuk-gu, Seoul 136-713, Republic of KoreaDepartment of Mathematics, University of Seoul, Jeonnong-dong, Dongdaemun-gu, Seoul 130-743, Republic of KoreaCenter for Information Security Technologies (CIST), Korea University, Anam-dong, Seongbuk-gu, Seoul 136-713, Republic of KoreaIn Choukri and Tunstall (2005), the authors showed that if they decreased the number of rounds in AES by injecting faults, it is possible to recover the secret key. In this paper, we propose fault injection attacks on HMAC/NMAC by applying the main idea of their attack. These attacks are applicable to HMAC/NMAC based on the MD-family hash functions and can recover the secret key with the negligible computational complexity. Particularly, these results on HMAC/NMAC-SHA-2 are the first known key recovery attacks so far.http://dx.doi.org/10.1155/2013/101907
spellingShingle Kitae Jeong
Yuseop Lee
Jaechul Sung
Seokhie Hong
Security Analysis of HMAC/NMAC by Using Fault Injection
Journal of Applied Mathematics
title Security Analysis of HMAC/NMAC by Using Fault Injection
title_full Security Analysis of HMAC/NMAC by Using Fault Injection
title_fullStr Security Analysis of HMAC/NMAC by Using Fault Injection
title_full_unstemmed Security Analysis of HMAC/NMAC by Using Fault Injection
title_short Security Analysis of HMAC/NMAC by Using Fault Injection
title_sort security analysis of hmac nmac by using fault injection
url http://dx.doi.org/10.1155/2013/101907
work_keys_str_mv AT kitaejeong securityanalysisofhmacnmacbyusingfaultinjection
AT yuseoplee securityanalysisofhmacnmacbyusingfaultinjection
AT jaechulsung securityanalysisofhmacnmacbyusingfaultinjection
AT seokhiehong securityanalysisofhmacnmacbyusingfaultinjection