A robust scan-based side-channel attack method against HMAC-SHA-256 circuits

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

A scan-based side-channel attack is still a real threat against a crypto circuit as well as a hash generator circuit, which can restore secret information by exploiting the scan data obtained from scan chains inside the chip during its processing. In this paper, we propose a scan-based attack method against a hash generator circuit called HMAC-SHA-256. Our proposed method restores the secret information by finding out the correspondence between the scan data obtained from a scan chain and the internal registers in the target HMAC-SHA-256 circuit, even if the scan chain includes registers other than the target hash generator circuit and an attacker does not know well the hash generation timing. Experimental results show that our proposed method successfully restores two secret keys of the HMAC-SHA-256 circuit in at most 6 hours.

Original languageEnglish
Title of host publication2017 IEEE 7th International Conference on Consumer Electronics - Berlin, ICCE-Berlin 2017
PublisherIEEE Computer Society
Pages79-84
Number of pages6
ISBN (Electronic)9781509040148
DOIs
Publication statusPublished - 2017 Dec 14
Event7th IEEE International Conference on Consumer Electronics - Berlin, ICCE-Berlin 2017 - Berlin, Germany
Duration: 2017 Sept 32017 Sept 6

Publication series

NameIEEE International Conference on Consumer Electronics - Berlin, ICCE-Berlin
Volume2017-September
ISSN (Print)2166-6814
ISSN (Electronic)2166-6822

Other

Other7th IEEE International Conference on Consumer Electronics - Berlin, ICCE-Berlin 2017
Country/TerritoryGermany
CityBerlin
Period17/9/317/9/6

Keywords

  • HMAC
  • SHA-256
  • scan-based attack
  • side-channel attack

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Industrial and Manufacturing Engineering
  • Media Technology

Fingerprint

Dive into the research topics of 'A robust scan-based side-channel attack method against HMAC-SHA-256 circuits'. Together they form a unique fingerprint.

Cite this