Practical Electromagnetic Template Attack on HMAC

  • Authors:
  • Pierre-Alain Fouque;Gaëtan Leurent;Denis Réal;Frédéric Valette

  • Affiliations:
  • École normale supérieure/CNRS/INRIA,;École normale supérieure/CNRS/INRIA,;INSA-IETR, Rennes, France 35043 and CELAR, Bruz, France 35;CELAR, Bruz, France 35

  • Venue:
  • CHES '09 Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we show a very efficient side channel attack against HMAC. Our attack assumes the presence of a side channel that reveals the Hamming distance of some registers. After a profiling phase in which the adversary has access to a device and can configure it, the attack recovers the secret key by monitoring a single execution of HMAC-SHA-1. The secret key can be recovered using a "template attack" with a computation of about 232 3 *** compression functions, where *** is the number of 32-bit words of the key. Finally, we show that our attack can also be used to break the secrecy of network protocols usually implemented on embedded devices. We have performed experiments using a NIOS processor executed on a Field Programmable Gate Array (FPGA) to confirm the leakage model. We hope that our results shed some light on the requirements in term of side channel attack for the future SHA-3 function.