I have trouble finding information on the security strength of HMAC-SHA256 against key recovery attacks with respect to the key size.
To fit a certain application I must use a 128-bits key with a HMAC-SHA256 function. All the documentation I read about HMAC-SHA256 advise or impose a 256-bits key, but the reason given for that is that less-than-256-bit keys would "lower the security strength", without much more details.
The HMAC is used to generate deterministic pseudorandom tags from a public message. I actually do not care about collisions, pre-image, forgery, etc : my only constraint is that the key must remain a secret. As stated, the only attack model that interests me is the key recovery attack, and I'd like to know if there is any literature on the influence of the key size, or if I could simply assume that against recovery attacks on HMAC-SHA256, the security strength when used with a 128-bits key is simply 128 bits.
Thank you,