A robust scan-based side-channel attack method against HMAC-SHA-256 circuits

    研究成果: Conference contribution

    1 引用 (Scopus)

    抄録

    A scan-based side-channel attack is still a real threat against a crypto circuit as well as a hash generator circuit, which can restore secret information by exploiting the scan data obtained from scan chains inside the chip during its processing. In this paper, we propose a scan-based attack method against a hash generator circuit called HMAC-SHA-256. Our proposed method restores the secret information by finding out the correspondence between the scan data obtained from a scan chain and the internal registers in the target HMAC-SHA-256 circuit, even if the scan chain includes registers other than the target hash generator circuit and an attacker does not know well the hash generation timing. Experimental results show that our proposed method successfully restores two secret keys of the HMAC-SHA-256 circuit in at most 6 hours.

    元の言語English
    ホスト出版物のタイトル2017 IEEE 7th International Conference on Consumer Electronics - Berlin, ICCE-Berlin 2017
    出版者IEEE Computer Society
    ページ79-84
    ページ数6
    2017-September
    ISBN(電子版)9781509040148
    DOI
    出版物ステータスPublished - 2017 12 14
    イベント7th IEEE International Conference on Consumer Electronics - Berlin, ICCE-Berlin 2017 - Berlin, Germany
    継続期間: 2017 9 32017 9 6

    Other

    Other7th IEEE International Conference on Consumer Electronics - Berlin, ICCE-Berlin 2017
    Germany
    Berlin
    期間17/9/317/9/6

    Fingerprint

    Networks (circuits)
    Side channel attack
    Processing

    ASJC Scopus subject areas

    • Electrical and Electronic Engineering
    • Industrial and Manufacturing Engineering
    • Media Technology

    これを引用

    Oku, D., Yanagisawa, M., & Togawa, N. (2017). A robust scan-based side-channel attack method against HMAC-SHA-256 circuits. : 2017 IEEE 7th International Conference on Consumer Electronics - Berlin, ICCE-Berlin 2017 (巻 2017-September, pp. 79-84). IEEE Computer Society. https://doi.org/10.1109/ICCE-Berlin.2017.8210596

    A robust scan-based side-channel attack method against HMAC-SHA-256 circuits. / Oku, Daisuke; Yanagisawa, Masao; Togawa, Nozomu.

    2017 IEEE 7th International Conference on Consumer Electronics - Berlin, ICCE-Berlin 2017. 巻 2017-September IEEE Computer Society, 2017. p. 79-84.

    研究成果: Conference contribution

    Oku, D, Yanagisawa, M & Togawa, N 2017, A robust scan-based side-channel attack method against HMAC-SHA-256 circuits. : 2017 IEEE 7th International Conference on Consumer Electronics - Berlin, ICCE-Berlin 2017. 巻. 2017-September, IEEE Computer Society, pp. 79-84, 7th IEEE International Conference on Consumer Electronics - Berlin, ICCE-Berlin 2017, Berlin, Germany, 17/9/3. https://doi.org/10.1109/ICCE-Berlin.2017.8210596
    Oku D, Yanagisawa M, Togawa N. A robust scan-based side-channel attack method against HMAC-SHA-256 circuits. : 2017 IEEE 7th International Conference on Consumer Electronics - Berlin, ICCE-Berlin 2017. 巻 2017-September. IEEE Computer Society. 2017. p. 79-84 https://doi.org/10.1109/ICCE-Berlin.2017.8210596
    Oku, Daisuke ; Yanagisawa, Masao ; Togawa, Nozomu. / A robust scan-based side-channel attack method against HMAC-SHA-256 circuits. 2017 IEEE 7th International Conference on Consumer Electronics - Berlin, ICCE-Berlin 2017. 巻 2017-September IEEE Computer Society, 2017. pp. 79-84
    @inproceedings{b35a1fe4d7d9449faa03d98983dde581,
    title = "A robust scan-based side-channel attack method against HMAC-SHA-256 circuits",
    abstract = "A scan-based side-channel attack is still a real threat against a crypto circuit as well as a hash generator circuit, which can restore secret information by exploiting the scan data obtained from scan chains inside the chip during its processing. In this paper, we propose a scan-based attack method against a hash generator circuit called HMAC-SHA-256. Our proposed method restores the secret information by finding out the correspondence between the scan data obtained from a scan chain and the internal registers in the target HMAC-SHA-256 circuit, even if the scan chain includes registers other than the target hash generator circuit and an attacker does not know well the hash generation timing. Experimental results show that our proposed method successfully restores two secret keys of the HMAC-SHA-256 circuit in at most 6 hours.",
    keywords = "HMAC, scan-based attack, SHA-256, side-channel attack",
    author = "Daisuke Oku and Masao Yanagisawa and Nozomu Togawa",
    year = "2017",
    month = "12",
    day = "14",
    doi = "10.1109/ICCE-Berlin.2017.8210596",
    language = "English",
    volume = "2017-September",
    pages = "79--84",
    booktitle = "2017 IEEE 7th International Conference on Consumer Electronics - Berlin, ICCE-Berlin 2017",
    publisher = "IEEE Computer Society",

    }

    TY - GEN

    T1 - A robust scan-based side-channel attack method against HMAC-SHA-256 circuits

    AU - Oku, Daisuke

    AU - Yanagisawa, Masao

    AU - Togawa, Nozomu

    PY - 2017/12/14

    Y1 - 2017/12/14

    N2 - A scan-based side-channel attack is still a real threat against a crypto circuit as well as a hash generator circuit, which can restore secret information by exploiting the scan data obtained from scan chains inside the chip during its processing. In this paper, we propose a scan-based attack method against a hash generator circuit called HMAC-SHA-256. Our proposed method restores the secret information by finding out the correspondence between the scan data obtained from a scan chain and the internal registers in the target HMAC-SHA-256 circuit, even if the scan chain includes registers other than the target hash generator circuit and an attacker does not know well the hash generation timing. Experimental results show that our proposed method successfully restores two secret keys of the HMAC-SHA-256 circuit in at most 6 hours.

    AB - A scan-based side-channel attack is still a real threat against a crypto circuit as well as a hash generator circuit, which can restore secret information by exploiting the scan data obtained from scan chains inside the chip during its processing. In this paper, we propose a scan-based attack method against a hash generator circuit called HMAC-SHA-256. Our proposed method restores the secret information by finding out the correspondence between the scan data obtained from a scan chain and the internal registers in the target HMAC-SHA-256 circuit, even if the scan chain includes registers other than the target hash generator circuit and an attacker does not know well the hash generation timing. Experimental results show that our proposed method successfully restores two secret keys of the HMAC-SHA-256 circuit in at most 6 hours.

    KW - HMAC

    KW - scan-based attack

    KW - SHA-256

    KW - side-channel attack

    UR - http://www.scopus.com/inward/record.url?scp=85043997278&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=85043997278&partnerID=8YFLogxK

    U2 - 10.1109/ICCE-Berlin.2017.8210596

    DO - 10.1109/ICCE-Berlin.2017.8210596

    M3 - Conference contribution

    AN - SCOPUS:85043997278

    VL - 2017-September

    SP - 79

    EP - 84

    BT - 2017 IEEE 7th International Conference on Consumer Electronics - Berlin, ICCE-Berlin 2017

    PB - IEEE Computer Society

    ER -