Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2
In this paper, FortifyIQ introduces Carry-based Differential Power Analysis (CDPA), a novel methodology that allows for attacking schemes involving arithmetical addition. This methodology is applied to what is believed to be the first published full-fledged attack on HMAC-SHA-2 which does not require a profiling stage.
First Full-Fledged Side Channel Attack on HMAC-SHA-2
FortifyIQ presents a novel practical template attack on HMAC-SHA-2 intended primarily against its implementations in hardware. Side-channel attacks pose a threat to cryptographic algorithms. HMAC is an important use case of a hash function, in which the input is partially secret and thus unknown to the attacker. Despite a few publications that discuss applications of power analysis techniques to attack HMAC-SHA-2, this is the first generic method that shows a full attack on its hardware implementation.
RAMBAM: A New Very Compact and Efficient Protection of AES against SC and FI attacks
This is an academic paper describing a protection method for AES which is very efficient, and configurable for any application. It introduces RAMBAM, an innovative algebraic masking technique designed to protect against side-channel attacks and SIFA1.
STORM— Small Table Oriented Redundancy-based SCA Mitigation for AES
STORM effectively solves the long-standing challenge of combining high
security against SCA with low gate count and high performance for AES implementations
by offering a different tradeoff (memory utilization) that may be preferable to RAMBAM
in many practical cases.