Research Article
Security Analysis of HMAC/NMAC by Using Fault Injection
Table 1
Our attack results on HMAC/NMAC.
| Algorithm | No. of injected faults | Algorithm | No. of injected faults |
| HMAC-MD4 | | NMAC-MD4 | | HMAC-MD5 | | NMAC-MD5 | | HMAC-SHA-224 | | NMAC-SHA-224 | | HMAC-SHA-256 | | NMAC-SHA-256 | | HMAC-SHA-384 | | NMAC-SHA-384 | | HMAC-SHA-512 | | NMAC-SHA-512 | |
|
|