@inproceedings{cad4890778dd4d5581d7e50e6a61a093,
title = "A fault attack on a hardware-based implementation of the secure hash algorithm SHA-512",
abstract = "Cryptographic hash functions are frequently used as basic components in cryptographic schemes such as message authentication codes, one-time signature schemes, and random number generators. In such applications the input to the hash function is a secret key or secret data. An investigation of the hash function against implementation attacks in such cases is indispensable. This paper presents a fault attack on the secure hash algorithm using the example of SHA-512. A fault model is proposed that relies on flipping two control bits to reduce the round number of the SHA-512 algorithm. By means of this attack the first data block can be extracted completely. The attack was applied to a keyed-hash message authentication code to reveal its secret key. A countermeasure is proposed to detect and prevent the attack. The attack and the countermeasure were evaluated for an FPGA implementation.",
author = "Abdulhadi Shoufan",
year = "2013",
doi = "10.1109/ReConFig.2013.6732292",
language = "British English",
isbn = "9781479920792",
series = "2013 International Conference on Reconfigurable Computing and FPGAs, ReConFig 2013",
publisher = "IEEE Computer Society",
booktitle = "2013 International Conference on Reconfigurable Computing and FPGAs, ReConFig 2013",
address = "United States",
note = "2013 International Conference on Reconfigurable Computing and FPGAs, ReConFig 2013 ; Conference date: 09-12-2013 Through 11-12-2013",
}