Side channel analysis of some hash based MACs: A response to SHA-3 requirements

Praveen Gauravaram, Katsuyuki Okeya

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    Abstract

    The forthcoming NIST's Advanced Hash Standard (AHS) competition to select SHA-3 hash function requires that each candidate hash function submission must have at least one construction to support FIPS 198 HMAC application. As part of its evaluation, NIST is aiming to select either a candidate hash function which is more resistant to known side channel attacks (SCA) when plugged into HMAC, or that has an alternative MAC mode which is more resistant to known SCA than the other submitted alternatives. In response to this, we perform differential power analysis (DPA) on the possible smart card implementations of some of the recently proposed MAC alternatives to NMAC (a fully analyzed variant of HMAC) and HMAC algorithms and NMAC/HMAC versions of some recently proposed hash and compression function modes. We show that the recently proposed BNMAC and KMDP MAC schemes are even weaker than NMAC/HMAC against the DPA attacks, whereas multi-lane NMAC, EMD MAC and the keyed wide-pipe hash have similar security to NMAC against the DPA attacks. Our DPA attacks do not work on the NMAC setting of MDC-2, Grindahl and MAME compression functions.
    Original languageEnglish
    Title of host publicationInformation and Communications Security : 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedings
    EditorsLiqun Chen, Mark Ryan, Guilin Wang
    Number of pages436
    PublisherSpringer
    Publication date2008
    Edition10
    Pages111-127
    ISBN (Print)978-3-540-88624-2
    DOIs
    Publication statusPublished - 2008
    Event10th International Conference on Information and Communication Security - Birmingham, United Kingdom
    Duration: 20 Oct 200822 Oct 2008
    Conference number: 10

    Conference

    Conference10th International Conference on Information and Communication Security
    Number10
    Country/TerritoryUnited Kingdom
    CityBirmingham
    Period20/10/200822/10/2008
    SeriesLecture Notes in Computer Science
    Number5308
    ISSN0302-9743

    Keywords

    • hash functions
    • Applied cryptography
    • HMAC
    • side channel attacks

    Fingerprint

    Dive into the research topics of 'Side channel analysis of some hash based MACs: A response to SHA-3 requirements'. Together they form a unique fingerprint.

    Cite this