760 Hits in 6.0 sec

Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements [chapter]

Praveen Gauravaram, Katsuyuki Okeya
2008 Lecture Notes in Computer Science  
Requirement of a hash submission to the AHS competition Support for the FIPS applications (FIPS 198 HMAC) Consideration of side channel attacks (SCA) on the hash based MACs 1.  ...  Resistance to SCA for other MAC configurations Hypothesis New hash and compression function modes as SHA-3 candidates Compression function modes could be based on block ciphers (PGV) SHA-3 requirement  ...  Padding procedure in BNMAC does not depend on the message length Recovery of k 1 depends on the architecture of f k 2 is enough to forge BNMAC: ) ⊕ E m 2 (P (H 1 )) = H 2 using N 2 of m 1 m 2 and recover  ... 
doi:10.1007/978-3-540-88625-9_8 fatcat:j672czagorfvtk7v4zblorclp4

Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E) [article]

Robert Merget, Marcus Brinkmann, Nimrod Aviram, Juraj Somorovsky, Johannes Mittmann, Jörg Schwenk
2020 IACR Cryptology ePrint Archive  
The Raccoon attack takes advantage of uncommon DH modulus sizes, which depend on the properties of the used hash functions.  ...  Our main result is a novel side-channel attack, named Raccoon attack, which exploits a timing vulnerability in TLS-DH(E), leaking the most significant bits of the shared Diffie-Hellman secret.  ...  Side-channel attacks against TLS.  ... 
dblp:journals/iacr/MergetBASMS20 fatcat:imgympuz3vbalo6wfvn35seasu

Side-Channel Analysis of Grøstl and Skein

Christina Boura, Sylvain Lévêque, David Vigilant
2012 2012 IEEE Symposium on Security and Privacy Workshops  
For the validation of our choices, we implemented HMAC-Grøstl, HMAC-Skein as well as countermeasures on a 32-bit ARM-based smart card.  ...  We also mounted power analysis attacks in practice on both unprotected and protected implementations. Finally, the performance difference between both versions is discussed.  ...  SKEIN Skein [11] is a hash function family based on the tweakable block cipher Threefish. Three different internal state sizes are available: 256, 512 and 1024 bits.  ... 
doi:10.1109/spw.2012.13 dblp:conf/sp/BouraLV12 fatcat:35k5uqn7braerhcranx4ddrqvq

Differential and Correlation Power Analysis Attacks on HMAC-Whirlpool

Fan Zhang, Zhijie Jerry Shi
2011 2011 Eighth International Conference on Information Technology: New Generations  
The security of the HMAC relies on the underlying hash function and the secret key. Whirlpool is a block cipher based hash algorithm that has been in public for about ten years.  ...  We designed two types of attacks: one is based on Differential Power Analysis (DPA) and the other on Correlation Power Analysis (CPA).  ...  Barreto, is a cryptographic hash function based on a 512-bits block cipher that is very similar to AES [6] .  ... 
doi:10.1109/itng.2011.70 dblp:conf/itng/ZhangS11 fatcat:cphqbqawbjbrfaantv4tlz42gq

Cryptanalysis of HMAC/NMAC-Whirlpool [chapter]

Jian Guo, Yu Sasaki, Lei Wang, Shuang Wu
2013 Lecture Notes in Computer Science  
In this paper, we present universal forgery and key recovery attacks on the most popular hash-based MAC constructions, e.g., HMAC and NMAC, instantiated with an AES-like hash function Whirlpool.  ...  Interestingly, the number of attacked rounds is comparable with that for collision and preimage attacks on Whirlpool hash function itself.  ...  This research was initially started from a discussion at the second Asian Workshop on Symmetric Key Cryptography (ASK 2012). We would like to thank the organizers of ASK12.  ... 
doi:10.1007/978-3-642-42045-0_2 fatcat:hpkhatgszbhh7lllwwfcfqj5my

Scan-based Side-channel Attack against HMAC-SHA-256 Circuits Based on Isolating Bit-transition Groups Using Scan Signatures

Daisuke Oku, Masao Yanagisawa, Nozomu Togawa
2018 IPSJ Transactions on System LSI Design Methodology  
In this paper, we propose a scan-based attack method against a hash generator circuit called HMAC-SHA-256.  ...  On the other hand, a scan-based side-channel attack is focused on which can restore secret information by exploiting the scan data obtained from a scan chain inside the crypto chip during cryptographic  ...  [11] which proposes an electromagnetic side-channel attack method against the HMAC-SHA-256 circuit. We focus on the simplest implementation based on Ref.  ... 
doi:10.2197/ipsjtsldm.11.16 fatcat:f2sbcoja2rgzddf5piifztnyme

Cryptography for Network Security: Failures, Successes and Challenges [chapter]

Bart Preneel
2010 Lecture Notes in Computer Science  
The most powerful attacks against AES and other block ciphers have not been pure mathematical attacks, but timing attacks based on cache effects -this kind of attack applies in principle to any cryptographic  ...  The CBC-MAC construction based on an n-bit block cipher can be described as follows.  ... 
doi:10.1007/978-3-642-14706-7_4 fatcat:hzrbqmkyuzc2hiz3jf6whoxelu

Practical Electromagnetic Template Attack on HMAC [chapter]

Pierre-Alain Fouque, Gaëtan Leurent, Denis Réal, Frédéric Valette
2009 Lecture Notes in Computer Science  
In this paper, we show a very efficient side channel attack against HMAC. Our attack assumes the presence of a side channel that reveals the Hamming distance of some registers.  ...  We hope that our results shed some light on the requirements in term of side channel attack for the future SHA-3 function.  ...  Related Work on Side Channel Attacks Since there is no efficient and practical attacks against HMAC, it is interesting to study the security of this function against side channel attacks.  ... 
doi:10.1007/978-3-642-04138-9_6 fatcat:stnfyp3xpre5bc6kzwsxb5n2za

Vulnerabilities and Limitations of MQTT Protocol Used between IoT Devices

Dan Dinculeană, Xiaochun Cheng
2019 Applied Sciences  
of developing and implementing mechanisms to protect against such attacks.  ...  The method, called Value-to-Keyed-Hash Message Authentication Code (Value-to-HMAC) mapping, uses signatures to send messages, instead of encryption, by implementing a Keyed-Hash Message Authentication  ...  Among increasing researches on IoT security [16] [17] [18] [19] , this paper presents a solution to meet specific application constraints.  ... 
doi:10.3390/app9050848 fatcat:znmrk6btpjcdnaysiznthizbny

Side-Channel Analysis of Six SHA-3 Candidates [chapter]

Olivier Benoît, Thomas Peyrin
2010 Lecture Notes in Computer Science  
For each of them, we give the exact procedure and appropriate choice of selection functions to perform the attack.  ...  Depending on their inherent structure and the internal primitives used (Sbox, addition or XOR), some schemes are more prone to side channel analysis than others, as shown by our simulations.  ...  MACs can be built upon block ciphers (i.e. CBC-MAC [6] ) or hash functions in the case of HMAC [5, 33] .  ... 
doi:10.1007/978-3-642-15031-9_10 fatcat:zaz7dxv7a5cb7js6scgv7huyci

An Efficient Key Management and Multi-layered Security Framework for SCADA Systems

Darshana Upadhyay, Marzia Zaman, Rohit Joshi, Srinivas Sampalli
2021 IEEE Transactions on Network and Service Management  
Moreover, for each session, we have introduced three symmetric key cryptography techniques based on the concept of Vernam cipher and a preshared session key, namely, random prime number generator, prime  ...  counter, and hash chaining.  ...  However, the cryptographic strength of the HMAC depends on the size of the secret key, since brute force attacks are the most common attacks against HMAC.  ... 
doi:10.1109/tnsm.2021.3104531 fatcat:w4e4vyx6ijc45mskgnbhyboqzq

Algebraic Fault Attack on the SHA-256 Compression Function

Ronglin Hao, Bao Li, Bingke Ma, Ling Song
2014 International Journal of Research in Computer Science  
Moreover, based on the attack on SHA-256 compression function, an almost universal forgery attack on HMAC-SHA-256 is presented.  ...  The cryptographic hash function SHA-256 is one member of the SHA-2 hash family, which was proposed in 2000 and was standardized by NIST in 2002 as a successor of SHA-1.  ...  Besides attacks against block and stream ciphers, the DFA attack on the compression function of a hash function has also been studied.  ... 
doi:10.7815/ijorcs.42.2014.079 fatcat:iduwq7nv65h3pbfpmmxgfr23ju

Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures [chapter]

Robert McEvoy, Michael Tunstall, Colin C. Murphy, William P. Marnane
2007 Lecture Notes in Computer Science  
In this paper, we describe a DPA attack strategy for the HMAC algorithm, based on the SHA-2 hash function family.  ...  However, if the HMAC algorithm is implemented in embedded hardware, it is vulnerable to side-channel attacks.  ...  [18, 19] highlight the susceptibility of MAC and HMAC algorithms to side-channel attacks, but the exposition is for the HMAC algorithm based on block-cipher based hash functions, in contrast with SHA  ... 
doi:10.1007/978-3-540-77535-5_23 fatcat:y3jcw3uihvfhpcsdd4qwpcgjfe

Efficient Implementation of a Crypto Library Using Web Assembly

BoSun Park, JinGyo Song, Seog Chung Seo
2020 Electronics  
For the ECDH using P-256 curve, the naive implementation of ECDH is vulnerable to side-channel attacks (SCA), e.g., simple power analysis (SPA), and timing analysis (TA).  ...  The proposed Web Assembly-based crypto library provides enhanced performance and resistance against SCA thus, it can be used in various web-based applications.  ...  Providing improved method that resists side channel attacks Until now, there have not been many studies of side-channel analysis on the web environment.  ... 
doi:10.3390/electronics9111839 fatcat:dveulytpcvfirihhx34r2ho66i

Password-Hashing Status

George Hatzivasilis
2017 Cryptography  
The Key-Derivation Functions (KDF) [34] derive one or more cryptographic keys that are based on an input password.  ...  The ordinary choice to provide protection against such attacks is key stretching.  ...  Catena follows an agile framework approach and is resistant to side-channel attacks. Lyra2 has an elegant sponge-based design and constitutes an alternative approach to side-channel protection.  ... 
doi:10.3390/cryptography1020010 fatcat:klnw5tucinfwfoxwe5zlpsepwi
« Previous Showing results 1 — 15 out of 760 results