An update on the side channel cryptanalysis of MACs based on cryptographic hash functions

Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2007

Standard

An update on the side channel cryptanalysis of MACs based on cryptographic hash functions. / Gauravaram, Praveen; Okeya, Katsuyuki.

INDOCRYPT 2007: 8th International Conference on Cryptology in India. ed. / Kannan Srinathan; Pandu Rangan; Moti Yung. Vol. 4859 Berlin Heidelberg : Springer-Verlag, 2007. p. 393-403 (Lecture Notes in Computer Science; No. 4859).

Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2007

Harvard

Gauravaram, P & Okeya, K 2007, 'An update on the side channel cryptanalysis of MACs based on cryptographic hash functions'. in K Srinathan, P Rangan & M Yung (eds), INDOCRYPT 2007: 8th International Conference on Cryptology in India. vol. 4859, Springer-Verlag, Berlin Heidelberg, pp. 393-403. Lecture Notes in Computer Science, no. 4859

APA

Gauravaram, P., & Okeya, K. (2007). An update on the side channel cryptanalysis of MACs based on cryptographic hash functions. In K. Srinathan, P. Rangan, & M. Yung (Eds.), INDOCRYPT 2007: 8th International Conference on Cryptology in India. (Vol. 4859, pp. 393-403). Berlin Heidelberg: Springer-Verlag. (Lecture Notes in Computer Science; No. 4859).

CBE

Gauravaram P, Okeya K. 2007. An update on the side channel cryptanalysis of MACs based on cryptographic hash functions. Srinathan K, Rangan P, Yung M, editors. In INDOCRYPT 2007: 8th International Conference on Cryptology in India. Berlin Heidelberg: Springer-Verlag. pp. 393-403. (Lecture Notes in Computer Science; No. 4859).

MLA

Gauravaram, Praveen and Katsuyuki Okeya "An update on the side channel cryptanalysis of MACs based on cryptographic hash functions"., Srinathan, Kannan Rangan, Pandu Yung, Moti (ed.). INDOCRYPT 2007: 8th International Conference on Cryptology in India. Berlin Heidelberg: Springer-Verlag. 2007. 393-403. (Lecture Notes in Computer Science; Journal number 4859).

Vancouver

Gauravaram P, Okeya K. An update on the side channel cryptanalysis of MACs based on cryptographic hash functions. In Srinathan K, Rangan P, Yung M, editors, INDOCRYPT 2007: 8th International Conference on Cryptology in India. Vol. 4859. Berlin Heidelberg: Springer-Verlag. 2007. p. 393-403. (Lecture Notes in Computer Science; No. 4859).

Author

Gauravaram, Praveen; Okeya, Katsuyuki / An update on the side channel cryptanalysis of MACs based on cryptographic hash functions.

INDOCRYPT 2007: 8th International Conference on Cryptology in India. ed. / Kannan Srinathan; Pandu Rangan; Moti Yung. Vol. 4859 Berlin Heidelberg : Springer-Verlag, 2007. p. 393-403 (Lecture Notes in Computer Science; No. 4859).

Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2007

Bibtex

@inbook{27808239832e42cd86ed43e663ee0362,
title = "An update on the side channel cryptanalysis of MACs based on cryptographic hash functions",
keywords = "RDPA, DPA,, MDx-MAC, HMAC, M-NMAC, Side channel attacks",
publisher = "Springer-Verlag",
author = "Praveen Gauravaram and Katsuyuki Okeya",
year = "2007",
editor = "Kannan Srinathan and Pandu Rangan and Moti Yung",
volume = "4859",
isbn = "978-3-540-77025-1",
series = "Lecture Notes in Computer Science",
pages = "393-403",
booktitle = "INDOCRYPT 2007",

}

RIS

TY - GEN

T1 - An update on the side channel cryptanalysis of MACs based on cryptographic hash functions

A1 - Gauravaram,Praveen

A1 - Okeya,Katsuyuki

AU - Gauravaram,Praveen

AU - Okeya,Katsuyuki

PB - Springer-Verlag

CY - Berlin Heidelberg

PY - 2007

Y1 - 2007

N2 - Okeya has established that HMAC/NMAC implementations based on only Matyas-Meyer-Oseas (MMO) PGV scheme and his two refined PGV schemes are secure against side channel DPA attacks when the block cipher in these constructions is secure against these attacks. The significant result of Okeya's analysis is that the implementations of HMAC/NMAC with the Davies-Meyer (DM) compression function based hash functions such as MD5 and SHA-1 are vulnerable to side channel attacks. In this paper, first we show a partial key recovery attack on NMAC/HMAC based on Okeya's two refined PGV schemes by taking practical constraints into consideration. Next, we propose new hybrid NMAC/HMAC schemes for security against side channel attacks assuming that their underlying block cipher is ideal. We then show that M-NMAC, MDx-MAC and a variant of the envelope MAC scheme based on DM with an ideal block cipher are secure against DPA attacks.

AB - Okeya has established that HMAC/NMAC implementations based on only Matyas-Meyer-Oseas (MMO) PGV scheme and his two refined PGV schemes are secure against side channel DPA attacks when the block cipher in these constructions is secure against these attacks. The significant result of Okeya's analysis is that the implementations of HMAC/NMAC with the Davies-Meyer (DM) compression function based hash functions such as MD5 and SHA-1 are vulnerable to side channel attacks. In this paper, first we show a partial key recovery attack on NMAC/HMAC based on Okeya's two refined PGV schemes by taking practical constraints into consideration. Next, we propose new hybrid NMAC/HMAC schemes for security against side channel attacks assuming that their underlying block cipher is ideal. We then show that M-NMAC, MDx-MAC and a variant of the envelope MAC scheme based on DM with an ideal block cipher are secure against DPA attacks.

KW - RDPA

KW - DPA,

KW - MDx-MAC

KW - HMAC

KW - M-NMAC

KW - Side channel attacks

SN - 978-3-540-77025-1

VL - 4859

BT - INDOCRYPT 2007

T2 - INDOCRYPT 2007

A2 - Yung,Moti

ED - Yung,Moti

T3 - Lecture Notes in Computer Science

T3 - en_GB

SP - 393

EP - 403

ER -