Side channel attacks on message authentication codes

  • Authors:
  • Katsuyuki Okeya;Tetsu Iwata

  • Affiliations:
  • Hitachi, Ltd., Systems Development Laboratory, Kawasaki, Japan;Dept. of Computer and Information Sciences, Ibaraki University, Hitachi, Ibaraki, Japan

  • Venue:
  • ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Side channel attacks are a serious menace to embedded devices with cryptographic applications which are utilized in sensor and ad hoc networks. In this paper we show that side channel attacks can be applied to message authentication codes, even if the countermeasure is applied to the underlying block cipher. In particular, we show that EMAC, OMAC, and PMAC are vulnerable to our attack. Based on simple power analysis, we show that several key bits can be extracted, and based on differential power analysis, we present selective forgery against these MACs. Our results suggest that protecting block ciphers against side channel attacks is not sufficient, and countermeasures are needed for MACs as well.