【24h】

Practical Electromagnetic Template Attack on HMAC

机译:HMAC实用电磁模板攻击

获取原文

摘要

In this paper, we show a very efficient side channel attack against HMAC. Our attack assumes the presence of a side channel that reveals the Hamming distance of some registers. After a profiling phase in which the adversary has access to a device and can configure it, the attack recovers the secret key by monitoring a single execution of HMAC-SHA-1. The secret key can be recovered using a "template attack" with a computation of about 2~(32)3~K compression functions, where K is the number of 32-bit words of the key. Finally, we show that our attack can also be used to break the secrecy of network protocols usually implemented on embedded devices. We have performed experiments using a NIOS processor executed on a Field Programmable Gate Array (FPGA) to confirm the leakage model. We hope that our results shed some light on the requirements in term of side channel attack for the future SHA-3 function.
机译:在本文中,我们对HMAC展示了一个非常有效的侧频攻击。我们的攻击假定存在侧视侧展示一些寄存器的汉明距离。经过对手可以访问设备并且可以配置它的分析阶段之后,通过监视HMAC-SHA-1的单个执行来攻击恢复秘密密钥。可以使用“模板攻击”恢复秘密密钥,其中计算约2〜(32)3〜K压缩函数,其中k是键的32位字的数量。最后,我们表明我们的攻击也可用于打破通常在嵌入式设备上实现的网络协议的保密。我们使用在现场可编程门阵列(FPGA)上执行的NIOS处理器进行了实验,以确认泄漏模型。我们希望我们的成果在未来的SHA-3功能方面的要求中阐明了一些要求。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号