A robust scan-based side-channel attack method against HMAC-SHA-256 circuits

    研究成果: Conference contribution

    1 引用 (Scopus)

    抜粋

    A scan-based side-channel attack is still a real threat against a crypto circuit as well as a hash generator circuit, which can restore secret information by exploiting the scan data obtained from scan chains inside the chip during its processing. In this paper, we propose a scan-based attack method against a hash generator circuit called HMAC-SHA-256. Our proposed method restores the secret information by finding out the correspondence between the scan data obtained from a scan chain and the internal registers in the target HMAC-SHA-256 circuit, even if the scan chain includes registers other than the target hash generator circuit and an attacker does not know well the hash generation timing. Experimental results show that our proposed method successfully restores two secret keys of the HMAC-SHA-256 circuit in at most 6 hours.

    元の言語English
    ホスト出版物のタイトル2017 IEEE 7th International Conference on Consumer Electronics - Berlin, ICCE-Berlin 2017
    出版者IEEE Computer Society
    ページ79-84
    ページ数6
    2017-September
    ISBN(電子版)9781509040148
    DOI
    出版物ステータスPublished - 2017 12 14
    イベント7th IEEE International Conference on Consumer Electronics - Berlin, ICCE-Berlin 2017 - Berlin, Germany
    継続期間: 2017 9 32017 9 6

    Other

    Other7th IEEE International Conference on Consumer Electronics - Berlin, ICCE-Berlin 2017
    Germany
    Berlin
    期間17/9/317/9/6

      フィンガープリント

    ASJC Scopus subject areas

    • Electrical and Electronic Engineering
    • Industrial and Manufacturing Engineering
    • Media Technology

    これを引用

    Oku, D., Yanagisawa, M., & Togawa, N. (2017). A robust scan-based side-channel attack method against HMAC-SHA-256 circuits. : 2017 IEEE 7th International Conference on Consumer Electronics - Berlin, ICCE-Berlin 2017 (巻 2017-September, pp. 79-84). IEEE Computer Society. https://doi.org/10.1109/ICCE-Berlin.2017.8210596