The original publication is available at www.springerlink.comInternational audienceIn this paper, we show that HMAC can be attacked using a very efficient side channel attack which reveals the Hamming distance of some registers. After a profiling phase which requires access to a similar device that can be configured by the adversary, the attack recovers the secret key on one recorded execution of HMAC-SHA-1 for example, on an embedded device. We perform experimentations using a NIOS processor executed on a Field Programmable Gate Array (FPGA) to confirm the leakage model. Besides the high efficiency of this attack, $2^32\cdot 3^k$ where $k$ is the number of 32-bit words of the key, that we tested with experimentations, our results also shed...
In today's world of ubiquitous connectivity, communications security is an ever-present concern. In ...
International audienceIn this paper, we investigate the security of the BLISS lattice-based signatur...
Side channel attacks exploit physical information that leaks from a cryptographic device in order to...
International audienceAs any algorithm manipulating secret data, HMAC is potentially vulnerable to s...
Part 3: Trusted ExecutionInternational audienceSide-channel attacks (SCA) exploit the reification of...
Ensuring protection against side channel attacks is a crucial requirement in the design of modern se...
International audienceThis paper presents the first side channel analysis from electromagnetic emiss...
Increased complexity in modern embedded systems has presented various important challenges with rega...
SM3 is a Chinese hash standard. HMAC SM3 uses a secret key to encrypt the input text and gives an ou...
This paper presents a new hardware architecture designed for protecting the key of cryptographic alg...
Traditionally, attacks on cryptographic algorithms looked for mathematical weaknesses in the underly...
Mobile appliances and especially smart cards have found more and more applications in the past two d...
With technology scaling, electronic devices are becoming ubiquitous in everyday applications (smartc...
National audienceSecurity is a key component for information technologies and communication. Securit...
The threat of side-channels is becoming increasingly prominent for resource-constrained internet-con...
In today's world of ubiquitous connectivity, communications security is an ever-present concern. In ...
International audienceIn this paper, we investigate the security of the BLISS lattice-based signatur...
Side channel attacks exploit physical information that leaks from a cryptographic device in order to...
International audienceAs any algorithm manipulating secret data, HMAC is potentially vulnerable to s...
Part 3: Trusted ExecutionInternational audienceSide-channel attacks (SCA) exploit the reification of...
Ensuring protection against side channel attacks is a crucial requirement in the design of modern se...
International audienceThis paper presents the first side channel analysis from electromagnetic emiss...
Increased complexity in modern embedded systems has presented various important challenges with rega...
SM3 is a Chinese hash standard. HMAC SM3 uses a secret key to encrypt the input text and gives an ou...
This paper presents a new hardware architecture designed for protecting the key of cryptographic alg...
Traditionally, attacks on cryptographic algorithms looked for mathematical weaknesses in the underly...
Mobile appliances and especially smart cards have found more and more applications in the past two d...
With technology scaling, electronic devices are becoming ubiquitous in everyday applications (smartc...
National audienceSecurity is a key component for information technologies and communication. Securit...
The threat of side-channels is becoming increasingly prominent for resource-constrained internet-con...
In today's world of ubiquitous connectivity, communications security is an ever-present concern. In ...
International audienceIn this paper, we investigate the security of the BLISS lattice-based signatur...
Side channel attacks exploit physical information that leaks from a cryptographic device in order to...