13
Views
0
CrossRef citations to date
0
Altmetric
 

Abstract

Streebog is a family of hash functions defined in the Russian cryptographic standard GOST R 34.11–2012. HMAC-Streebog, which is defined in RFC 7836, is a Streebog-based message authentication code. It supports keys of size ranging from 256 bits to 512 bits. In this article, we present fault-assisted side channel attacks on HMAC-Streebog-256 and HMAC-Streebog-512 that can recover the keys in real-time with 212.98 and 214.97 average number of fault injections, respectively, to ensure 95% success. The attacker is assumed to be able to simultaneously flip at the most 181 chosen bits of the inner hash if it is a 256–bit variant and 361 chosen bits of the hash otherwise. In comparison to existing fault attacks on HMAC-Streebog, our attacks have a larger temporal window for fault injection, target a more accessible location, and cannot be mitigated with output redundancy countermeasures. Some of the latest hardware vulnerabilities make the HMAC-Streebog implementations vulnerable to our attacks.

Disclosure statement

No potential conflict of interest was reported by the authors.

Notes

1 The data to be altered is available for more than 2t time, where t is the time taken by the compression function of Streebog, as the targeted modular addition is executed after two compression operations.

2 In output redundancy countermeasures, data is processed via redundant channels and the output will not be generated unless all of them agree to it. Still, the carry flag side-channel remains unaffected.

3 We assume that x(i1),y(i1) and c(i1) are independent, and Pr(x(i1)=0)=Pr(y(i1)=0)=0.5.

4 A random oracle is a theoretical black box that responds to every unique query with a response chosen uniformly at random from its output domain.

5 Since x and y are independent and distributed uniformly at random, yuxl and x, which constitute the chosen x’s, are also uniformly distributed. The definitions of yu,xl and x are given in Algorithm 3.

6 Success probability :=14·1+34·23=0.75.

7 The success rate of the passive analysis and the number of bits recovered increases with the number of messages authenticated using the same key.

Additional information

Notes on contributors

Gautham Sekar

Gautham Sekar is the PGDM Chair at the Madras School of Economics, India, and a Director of Madras Fintech Services Pvt. Ltd, India. He holds a PhD from KU Leuven in the area of cryptology. His interests include information security, data science and financial technology.

Mabin Joseph

Mabin Joseph is working as a Scientist at Indira Gandhi Centre for Atomic Research, Tamil Nadu, India. He completed his Ph.D. from the Homi Bhabha National Institute, India. His research interests are in cryptology, network security and data analytics.

R. Balasubramanian

R. Balasubramanian is a Retired Professor and former Director of the Institute of Mathematical Sciences, Chennai, India. He obtained his Ph.D. in Mathematics from the University of Bombay. His interests include number theory and cryptology. He is the recipient of several national and international accolades including the Padma Shri by the Government of India and the Chevalier de l’Ordre National du Merite by the Government of France.

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 61.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 92.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.