Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Security Analysis of HMAC/NMAC by Using Fault Injection

Full metadata record
DC Field Value Language
dc.contributor.authorJeong, Kitae-
dc.contributor.authorLee, Yuseop-
dc.contributor.authorSung, Jaechul-
dc.contributor.authorHong, Seokhie-
dc.date.accessioned2021-09-06T11:14:09Z-
dc.date.available2021-09-06T11:14:09Z-
dc.date.created2021-06-14-
dc.date.issued2013-
dc.identifier.issn1110-757X-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/106423-
dc.description.abstractIn Choukri and Tunstall (2005), the authors showed that if they decreased the number of rounds in AES by injecting faults, it is possible to recover the secret key. In this paper, we propose fault injection attacks on HMAC/NMAC by applying the main idea of their attack. These attacks are applicable to HMAC/NMAC based on the MD-family hash functions and can recover the secret key with the negligible computational complexity. Particularly, these results on HMAC/NMAC-SHA-2 are the first known key recovery attacks so far.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherHINDAWI LTD-
dc.subjectKEY-RECOVERY ATTACKS-
dc.titleSecurity Analysis of HMAC/NMAC by Using Fault Injection-
dc.typeArticle-
dc.contributor.affiliatedAuthorHong, Seokhie-
dc.identifier.doi10.1155/2013/101907-
dc.identifier.scopusid2-s2.0-84885999584-
dc.identifier.wosid000325288200001-
dc.identifier.bibliographicCitationJOURNAL OF APPLIED MATHEMATICS-
dc.relation.isPartOfJOURNAL OF APPLIED MATHEMATICS-
dc.citation.titleJOURNAL OF APPLIED MATHEMATICS-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaMathematics-
dc.relation.journalWebOfScienceCategoryMathematics, Applied-
dc.subject.keywordPlusKEY-RECOVERY ATTACKS-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Hong, Seok hie photo

Hong, Seok hie
Department of Information Security
Read more

Altmetrics

Total Views & Downloads

BROWSE