Abstract | ||
---|---|---|
At the cutting edge of today's security research and development, the SHA-3 competition evaluates a new secure hashing standard in succession to SHA-2. The five remaining candidates of the SHA-3 competition are BLAKE, Grøstl, JH, Keccak, and Skein. While the main focus was on the algorithmic security of the candidates, a side channel analysis has only been performed for BLAKE and Grøstl [1]. In order to equally evaluate all candidates, we identify side channel attacks on JH-MAC, Keccak-MAC, and Skein-MAC and demonstrate the applicability of the attacks by attacking their respective reference implementation. Additionally, we revisit the side channel analysis of Grøstl and introduce a profiling based side channel attack, which emphasizes the importance of side channel resistant hash functions by recovering the input to the hash function using only the measured power consumption. |
Year | DOI | Venue |
---|---|---|
2012 | 10.1109/DATE.2012.6176644 | Design, Automation & Test in Europe Conference & Exhibition |
Keywords | Field | DocType |
cryptography,file organisation,BLAKE,Grostl,JH-MAC,Keccak-MAC,SHA-3 competition,SHA-3 finalists,Skein-MAC,measured power consumption,secure hashing standard,side channel analysis,side channel resistant hash functions,DPA,SHA-3 Finalists,Side-Channel Analysis | Computer security,Computer science,Cryptography,Profiling (computer programming),Parallel computing,SHA-3,Theoretical computer science,Grøstl,Reference implementation,Side channel attack,Skein,Hash function | Conference |
ISSN | ISBN | Citations |
1530-1591 | 978-1-4577-2145-8 | 8 |
PageRank | References | Authors |
0.77 | 9 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Michael Zohner | 1 | 8 | 0.77 |
Michael Kasper | 2 | 8 | 0.77 |
Marc Stöttinger | 3 | 8 | 0.77 |
Sorin A. Huss | 4 | 14 | 1.56 |