DocumentCode :
1655497
Title :
Side channel analysis of the SHA-3 finalists
Author :
Zohner, Michael ; Kasper, Michael ; Stöttinger, Marc ; Huss, Sorin A.
Author_Institution :
Integrated Circuit & Syst. Lab. (ISS), Tech. Univ. Darmstadt, Darmstadt, Germany
fYear :
2012
Firstpage :
1012
Lastpage :
1017
Abstract :
At the cutting edge of today´s security research and development, the SHA-3 competition evaluates a new secure hashing standard in succession to SHA-2. The five remaining candidates of the SHA-3 competition are BLAKE, Grøstl, JH, Keccak, and Skein. While the main focus was on the algorithmic security of the candidates, a side channel analysis has only been performed for BLAKE and Grøstl [1]. In order to equally evaluate all candidates, we identify side channel attacks on JH-MAC, Keccak-MAC, and Skein-MAC and demonstrate the applicability of the attacks by attacking their respective reference implementation. Additionally, we revisit the side channel analysis of Grøstl and introduce a profiling based side channel attack, which emphasizes the importance of side channel resistant hash functions by recovering the input to the hash function using only the measured power consumption.
Keywords :
cryptography; file organisation; BLAKE; Grostl; JH-MAC; Keccak-MAC; SHA-3 competition; SHA-3 finalists; Skein-MAC; measured power consumption; secure hashing standard; side channel analysis; side channel resistant hash functions; Bit rate; Correlation; Cryptography; Mathematical model; Power demand; Resistance; Support vector machines; DPA; SHA-3 Finalists; Side-Channel Analysis;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Design, Automation & Test in Europe Conference & Exhibition (DATE), 2012
Conference_Location :
Dresden
ISSN :
1530-1591
Print_ISBN :
978-1-4577-2145-8
Type :
conf
DOI :
10.1109/DATE.2012.6176644
Filename :
6176644
Link To Document :
بازگشت