University of Birmingham > Talks@bham > Computer Security Seminars > Side-Channel Attacks on SHA-1-based Product Authentication ICs

Side-Channel Attacks on SHA-1-based Product Authentication ICs

Add to your list(s) Download to your calendar using vCal

If you have a question about this talk, please contact Gurchetan Grewal.

To prevent product counterfeiting, a common practice is to cryptographically authenticate system components (e.g., inkjet cartridges, batteries, or spare parts) using dedicated ICs. We analysed the security of two wide-spread examples for such devices, the DS28E01 and DS2432 SHA -1-based authentication ICs manufactured by Maxim Integrated. We show that the 64-bit secret can be fully extracted using non-invasive side-channel analysis with 1,800 and 1,200 traces, respectively.

Doing so, we present the, to our knowledge, first side-channel attack on real-world devices employing an HMAC -like construction. The results highlight that there is an evident need for protection against implementation attacks also for the case of low-cost devices like product authentication ICs.

This talk is part of the Computer Security Seminars series.

Tell a friend about this talk:

This talk is included in these lists:

Note that ex-directory lists are not shown.

 

Talks@bham, University of Birmingham. Contact Us | Help and Documentation | Privacy and Publicity.
talks@bham is based on talks.cam from the University of Cambridge.