Research Article

Security Analysis of HMAC/NMAC by Using Fault Injection

Table 1

Our attack results on HMAC/NMAC.

Algorithm No. of injected faults Algorithm No. of injected faults

HMAC-MD4 NMAC-MD4
HMAC-MD5 NMAC-MD5
HMAC-SHA-224 NMAC-SHA-224
HMAC-SHA-256 NMAC-SHA-256
HMAC-SHA-384 NMAC-SHA-384
HMAC-SHA-512 NMAC-SHA-512