Table of Contents Author Guidelines Submit a Manuscript
Journal of Applied Mathematics
Volume 2013 (2013), Article ID 101907, 6 pages
http://dx.doi.org/10.1155/2013/101907
Research Article

Security Analysis of HMAC/NMAC by Using Fault Injection

1Center for Information Security Technologies (CIST), Korea University, Anam-dong, Seongbuk-gu, Seoul 136-713, Republic of Korea
2Department of Mathematics, University of Seoul, Jeonnong-dong, Dongdaemun-gu, Seoul 130-743, Republic of Korea

Received 18 July 2013; Accepted 22 August 2013

Academic Editor: Jongsung Kim

Copyright © 2013 Kitae Jeong et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. Bellare, R. Canetti, and H. Krawczyk, “Keying hash functions for message authentication,” in Proceedings of the Annual International Cryptology Conference (CRYPTO ’96), vol. 1109 of Lecture Notes in Computer Science, pp. 10–15, August 1996.
  2. S. Contini and Y. L. Yin, “Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions,” in Advances in Cryptology, vol. 4284 of Lecture Notes in Computer Science, pp. 37–53, 2006. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  3. P. A. Fouque, G. Leurent, and P. Q. Nguyen, “Full key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5,” in Advances in Cryptology, vol. 4622 of Lecture Notes in Computer Science, pp. 13–30, 2007. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  4. L. Wang, K. Ohta, and N. Kunihiro, “New key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5,” in Advances in Cryptology (EUROCRYPT 2008), vol. 4965 of Lecture Notes in Computer Science, pp. 237–253, 2008. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  5. R. McEvoy, M. Tunstall, C. C. Murphy, and W. P. Marnane, “Differential power analysis of HMAC based on SHA-2, and countermeasures,” in Advances in Cryptology, vol. 4867 of Lecture Notes in Computer Science, pp. 317–332, 2007. View at Publisher · View at Google Scholar · View at Scopus
  6. O. Benoît and T. Peyrin, “Side-channel analysis of six sha-3 candidates,” in Advances in Cryptology, vol. 6225 of Lecture Notes in Computer Science, pp. 140–157, 2010. View at Publisher · View at Google Scholar · View at Scopus
  7. P. Kocher, “Timing attacks on implementation of Diffie-Hellman,” in Advances in Cryptology, vol. 1109 of Lecture Notes in Computer Science, pp. 104–113, 1996. View at Google Scholar
  8. E. Biham and A. Shamir, “Differential fault analysis of secret key cryptosystems,” in Advances in Cryptology, vol. 1294 of Lecture Notes in Computer Science, pp. 513–525, 1997. View at Google Scholar
  9. D. Boneh, R. A. DeMillo, and R. J. Lipton, “On the importance of checking cryptographic protocols for faults,” in Advances in Cryptology, vol. 1233 of Lecture Notes in Computer Science, pp. 37–51, 1997. View at Publisher · View at Google Scholar · View at MathSciNet
  10. K. Jeong, Y. Lee, J. Sung, and S. Hong, “Differential fault analysis on block cipher SEED,” Mathematical and Computer Modelling, vol. 55, no. 1-2, pp. 26–34, 2012. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  11. K. Jeong and C. Lee, “Differential fault analysis on block cipher LED-64,” in Future Information Technology, Application, and Service, vol. 164 of Lecture Notes in Electrical Engineering, pp. 747–755, 2012. View at Google Scholar
  12. K. Jeong, J. Sung, S. Hong, and C. Lee, “A new approach of differential fault analysis on block ciphers with S-box,” Information, vol. 16, no. 3, pp. 1915–1928, 2013. View at Google Scholar
  13. H. Choukri and M. Tunstall, “Round reduction using faults,” in Proceedings of the Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC '05), pp. 13–24, 2005.
  14. R. Rivest, “The MD4 message digest algorithm,” RFC 1320, 1992.
  15. R. Rivest, “The MD5 message digest algorithm,” RFC 1321, 1992.
  16. National Institute of Standards and Technology, FIPS PUB 180-2: Secure Hash Standard, 2002.
  17. C. H. Kim and J. J. Quisquater, “Fault attacks for CRT based RSA: new attacks, new results, and new countermeasures,” in Proceedings of the Workshop on Information Security Theory and Practices, vol. 4462 of Lecture Notes in Computer Science, pp. 215–228, May 2007. View at Scopus
  18. J. G. J. Van Woudenberg, M. F. Witteman, and F. Menarini, “Practical optical fault injection on secure microcontrollers,” in Proceedings of the 8th International Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC '11), pp. 91–99, September 2011. View at Publisher · View at Google Scholar · View at Scopus