The search functionality is under construction.

IEICE TRANSACTIONS on Fundamentals

Side Channel Attacks against Hash-Based MACs with PGV Compression Functions

Katsuyuki OKEYA

  • Full Text Views

    0

  • Cite this

Summary :

HMAC is one of the most famous keyed hash functions, and widely utilized. In order to design secure hash functions, we often use PGV construction consisting of 64 schemes, each of which utilizes a block cipher. If the underlying block cipher is ideal, 12 schemes are proven to be secure. In this paper, we evaluate the security of these schemes in view of side channel attacks. As it turns out, HMACs based on 11 out of 12 secure PGV schemes are vulnerable to side channel attacks, even if the underlying block cipher is secure against side channel attacks. These schemes are classified into two groups based on their vulnerabilities. For the first group which contains 8 schemes, we show that the attacker can reveal the whole key of HMAC, and selectively forge in consequence. For the other group which contains 3 schemes, we specify the importance of the execution sequence for the inner operations of the scheme, and refine it. If wrong orders of operations are used, the attacker can reveal a portion of the key of HMAC. Hence, the use of HMACs based on such PGV schemes as they are is not recommended when the resistance against side channel attacks is necessary.

Publication
IEICE TRANSACTIONS on Fundamentals Vol.E91-A No.1 pp.168-175
Publication Date
2008/01/01
Publicized
Online ISSN
1745-1337
DOI
10.1093/ietfec/e91-a.1.168
Type of Manuscript
Special Section PAPER (Special Section on Cryptography and Information Security)
Category
Side Channel Attacks

Authors

Keyword