Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements

Gauravaram, Praveen & Okeya, Katsuyuki (2008) Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements. In Chen, Liqun, Ryan, Mark, & Wng, Guilin (Eds.) Information and Communications Security. Springer, Berlin, pp. 111-127.

View at publisher

Abstract

The forthcoming NIST’s Advanced Hash Standard (AHS) competition to select SHA-3 hash function requires that each candidate hash function submission must have at least one construction to support FIPS 198 HMAC application. As part of its evaluation, NIST is aiming to select either a candidate hash function which is more resistant to known side channel attacks (SCA) when plugged into HMAC, or that has an alternative MAC mode which is more resistant to known SCA than the other submitted alternatives. In response to this, we perform differential power analysis (DPA) on the possible smart card implementations of some of the recently proposed MAC alternatives to NMAC (a fully analyzed variant of HMAC) and HMAC algorithms and NMAC/HMAC versions of some recently proposed hash and compression function modes. We show that the recently proposed BNMAC and KMDP MAC schemes are even weaker than NMAC/HMAC against the DPA attacks, whereas multi-lane NMAC, EMD MAC and the keyed wide-pipe hash have similar security to NMAC against the DPA attacks. Our DPA attacks do not work on the NMAC setting of MDC-2, Grindahl and MAME compression functions.

Impact and interest:

5 citations in Scopus
Search Google Scholar™
3 citations in Web of Science®

Citation counts are sourced monthly from Scopus and Web of Science® citation databases.

These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.

Citations counts from the Google Scholar™ indexing service can be viewed at the linked Google Scholar™ search.

ID Code: 81642
Item Type: Book Chapter
Keywords: Applied cryptography, hash functions, side channel attacks, HMAC
DOI: 10.1007/978-3-540-88625-9_8
ISBN: 978-3-540-88625-9
ISSN: 1611-3349
Divisions: Current > Schools > School of Electrical Engineering & Computer Science
Current > QUT Faculties and Divisions > Science & Engineering Faculty
Copyright Owner: Copyright 2008 Springer Berlin Heidelberg
Deposited On: 05 Feb 2015 05:37
Last Modified: 30 Oct 2015 16:07

Export: EndNote | Dublin Core | BibTeX

Repository Staff Only: item control page