Fault-assisted side-channel analysis of HMAC-Streebog
Gautham SekarMabin JosephR. BalasubramanianGautham Sekar is the PGDM Chair at the Madras School of Economics,India,and a Director of Madras Fintech Services Pvt. Ltd,India. He holds a PhD from KU Leuven in the area of cryptology. His interests include information security,data science and financial technology.Mabin Joseph is working as a Scientist at Indira Gandhi Centre for Atomic Research,Tamil Nadu,India. He completed his Ph.D. from the Homi Bhabha National Institute,India. His research interests are in cryptology,network security and data analytics.R. Balasubramanian is a Retired Professor and former Director of the Institute of Mathematical Sciences,Chennai,India. He obtained his Ph.D. in Mathematics from the University of Bombay. His interests include number theory and cryptology. He is the recipient of several national and international accolades including the Padma Shri by the Government of India and the Chevalier de l'Ordre National du Merite by the Government of France.
DOI: https://doi.org/10.1080/01611194.2024.2328548
2024-04-16
Cryptologia
Abstract:Streebog is a family of hash functions defined in the Russian cryptographic standard GOST R 34.11–2012. HMAC-Streebog, which is defined in RFC 7836, is a Streebog-based message authentication code. It supports keys of size ranging from 256 bits to 512 bits. In this article, we present fault-assisted side channel attacks on HMAC-Streebog-256 and HMAC-Streebog-512 that can recover the keys in real-time with 212.98 and 214.97 average number of fault injections, respectively, to ensure 95% success. The attacker is assumed to be able to simultaneously flip at the most 181 chosen bits of the inner hash if it is a 256–bit variant and 361 chosen bits of the hash otherwise. In comparison to existing fault attacks on HMAC-Streebog, our attacks have a larger temporal window for fault injection, target a more accessible location, and cannot be mitigated with output redundancy countermeasures. Some of the latest hardware vulnerabilities make the HMAC-Streebog implementations vulnerable to our attacks.
mathematics, applied,computer science, theory & methods,history & philosophy of science