![]() |
![]() |
University of Birmingham > Talks@bham > Computer Security Seminars > Side-Channel Attacks on SHA-1-based Product Authentication ICs
Side-Channel Attacks on SHA-1-based Product Authentication ICsAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Gurchetan Grewal. To prevent product counterfeiting, a common practice is to cryptographically authenticate system components (e.g., inkjet cartridges, batteries, or spare parts) using dedicated ICs. We analysed the security of two wide-spread examples for such devices, the DS28E01 and DS2432 SHA -1-based authentication ICs manufactured by Maxim Integrated. We show that the 64-bit secret can be fully extracted using non-invasive side-channel analysis with 1,800 and 1,200 traces, respectively. Doing so, we present the, to our knowledge, first side-channel attack on real-world devices employing an HMAC -like construction. The results highlight that there is an evident need for protection against implementation attacks also for the case of low-cost devices like product authentication ICs. This talk is part of the Computer Security Seminars series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsPostgraduate Seminars in the School of Computer Science Facts and Snacks Physics and Astronomy ColloquiaOther talksSylow branching coefficients for symmetric groups Provably Convergent Plug-and-Play Quasi-Newton Methods for Imaging Inverse Problems Test talk TBC Extending the Lax type operator for finite W-algebras Geometry of alternating projections in metric spaces with bounded curvature |