A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2011; you can also visit the original URL.
The file type is application/pdf
.
Practical Electromagnetic Template Attack on HMAC
[chapter]
2009
Lecture Notes in Computer Science
In this paper, we show a very efficient side channel attack against HMAC. Our attack assumes the presence of a side channel that reveals the Hamming distance of some registers. After a profiling phase in which the adversary has access to a device and can configure it, the attack recovers the secret key by monitoring a single execution of HMAC-SHA-1. The secret key can be recovered using a "template attack" with a computation of about 2 32 3 κ compression functions, where κ is the number of
doi:10.1007/978-3-642-04138-9_6
fatcat:stnfyp3xpre5bc6kzwsxb5n2za