Title
Side channel analysis of the SHA-3 finalists
Abstract
At the cutting edge of today's security research and development, the SHA-3 competition evaluates a new secure hashing standard in succession to SHA-2. The five remaining candidates of the SHA-3 competition are BLAKE, Grøstl, JH, Keccak, and Skein. While the main focus was on the algorithmic security of the candidates, a side channel analysis has only been performed for BLAKE and Grøstl [1]. In order to equally evaluate all candidates, we identify side channel attacks on JH-MAC, Keccak-MAC, and Skein-MAC and demonstrate the applicability of the attacks by attacking their respective reference implementation. Additionally, we revisit the side channel analysis of Grøstl and introduce a profiling based side channel attack, which emphasizes the importance of side channel resistant hash functions by recovering the input to the hash function using only the measured power consumption.
Year
DOI
Venue
2012
10.1109/DATE.2012.6176644
Design, Automation & Test in Europe Conference & Exhibition
Keywords
Field
DocType
cryptography,file organisation,BLAKE,Grostl,JH-MAC,Keccak-MAC,SHA-3 competition,SHA-3 finalists,Skein-MAC,measured power consumption,secure hashing standard,side channel analysis,side channel resistant hash functions,DPA,SHA-3 Finalists,Side-Channel Analysis
Computer security,Computer science,Cryptography,Profiling (computer programming),Parallel computing,SHA-3,Theoretical computer science,Grøstl,Reference implementation,Side channel attack,Skein,Hash function
Conference
ISSN
ISBN
Citations 
1530-1591
978-1-4577-2145-8
8
PageRank 
References 
Authors
0.77
9
4
Name
Order
Citations
PageRank
Michael Zohner180.77
Michael Kasper280.77
Marc Stöttinger380.77
Sorin A. Huss4141.56