首页> 外文会议>Cryptographic hardware and embedded systems-CHES 2009 >Practical Electromagnetic Template Attack on HMAC
【24h】

Practical Electromagnetic Template Attack on HMAC

机译:对HMAC的实用电磁模板攻击

获取原文
获取原文并翻译 | 示例

摘要

In this paper, we show a very efficient side channel attack against HMAC. Our attack assumes the presence of a side channel that reveals the Hamming distance of some registers. After a profiling phase in which the adversary has access to a device and can configure it, the attack recovers the secret key by monitoring a single execution of HMAC-SHA-1. The secret key can be recovered using a "template attack" with a computation of about 2~(32)3~κ compression functions, where k is the number of 32-bit words of the key. Finally, we show that our attack can also be used to break the secrecy of network protocols usually implemented on embedded devices.rnWe have performed experiments using a NIOS processor executed on a Field Programmable Gate Array (FPGA) to confirm the leakage model. We hope that our results shed some light on the requirements in term of side channel attack for the future SHA-3 function.
机译:在本文中,我们展示了针对HMAC的非常有效的边信道攻击。我们的攻击假设存在一条侧向通道,该通道揭示了某些寄存器的汉明距离。在分析阶段(攻击者可以访问设备并对其进行配置)之后,攻击将通过监视HMAC-SHA-1的单次执行来恢复密钥。可以使用“模板攻击”来恢复秘密密钥,该模板攻击具有大约2〜(32)3〜κ压缩函数的计算量,其中k是密钥的32位字的数量。最后,我们证明了我们的攻击还可以用来破坏通常在嵌入式设备上实现的网络协议的保密性。我们已经使用在现场可编程门阵列(FPGA)上执行的NIOS处理器进行了实验,以确认泄漏模型。我们希望我们的结果能对将来的SHA-3功能在侧通道攻击方面的要求有所启发。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号