Abstract
In Choukri and Tunstall (2005), the authors showed that if they decreased the number of rounds in AES by injecting faults, it is possible to recover the secret key. In this paper, we propose fault injection attacks on HMAC/NMAC by applying the main idea of their attack. These attacks are applicable to HMAC/NMAC based on the MD-family hash functions and can recover the secret key with the negligible computational complexity. Particularly, these results on HMAC/NMAC-SHA-2 are the first known key recovery attacks so far.
| Original language | English |
|---|---|
| Article number | 101907 |
| Journal | Journal of Applied Mathematics |
| Volume | 2013 |
| DOIs | |
| State | Published - 2013 |
Fingerprint
Dive into the research topics of 'Security analysis of HMAC/NMAC by using fault injection'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver