Presentation 2006-09-13
Side Channel Attacks against HMACs with Design for Hash Functions
Katsuyuki OKEYA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) HMAC is one of the most famous keyed hash functions, and widely utilized. In order to design secure hash functions, we often use PGV construction consisting of 64 schemes, each of which utilizes a block cipher. If the underlying block cipher is ideal, 12 schemes are proven to be secure. In this paper, we evaluate the security of these schemes in view of side channel attacks. As it turns out, HMACs based on 11 out of 12 secure PGV schemes are vulnerable to side channel attacks, even if the underlying block cipher is secure against side channel attacks. These schemes are classified into two groups based on their vulnerabilities. For the first group which contains 8 schemes, we show that the attacker can reveal the whole key of HMAC, and selectively forge in consequence. For the other group which contains 3 schemes, we specify the importance of the execution sequence for the inner operations of the scheme, and refine it. If wrong orders of operations are used, the attacker can reveal a portion of the key of HMAC. Hence, the use of HMACs based on such PGV schemes as they are is not recommended when the resistance against side channel attacks is necessary.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) (keyed) hash function / HMAC / PGV construction / side channel attacks / differential power analysis (DPA) / reverse DPA
Paper # ISEC2006-79
Date of Issue

Conference Information
Committee ISEC
Conference Date 2006/9/6(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Side Channel Attacks against HMACs with Design for Hash Functions
Sub Title (in English)
Keyword(1) (keyed) hash function
Keyword(2) HMAC
Keyword(3) PGV construction
Keyword(4) side channel attacks
Keyword(5) differential power analysis (DPA)
Keyword(6) reverse DPA
1st Author's Name Katsuyuki OKEYA
1st Author's Affiliation Hitachi, Ltd., Systems Development Laboratory()
Date 2006-09-13
Paper # ISEC2006-79
Volume (vol) vol.106
Number (no) 235
Page pp.pp.-
#Pages 8
Date of Issue