Abstract
In this paper we study six 2nd round SHA-3 candidates from a side-channel cryptanalysis point of view. For each of them, we give the exact procedure and appropriate choice of selection functions to perform the attack. Depending on their inherent structure and the internal primitives used (Sbox, addition or XOR), some schemes are more prone to side channel analysis than others, as shown by our simulations.
Chapter PDF
Similar content being viewed by others
References
Agrawal, D., Archambeault, B., Rao, J.R., Rohatgi, P.: The EM Side-Channel(s). In: Jr., et al. (eds.) [22], pp. 29ā45.
Akkar, M.-L., Giraud, C.: An Implementation of DES and AES, Secure against Some Attacks. In: KoƧ, Ć.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.Ā 2162, pp. 309ā318. Springer, Heidelberg (2001)
Aumasson, J.-P., Henzen, L., Meier, W., Phan, R.C.-W.: SHA-3 proposal BLAKE. Submission to NIST (2008)
Bellare, M.: New Proofs for NMAC and HMAC: Security Without Collision-Resistance. Cryptology ePrint Archive, Report 2006/043 (2006), http://eprint.iacr.org/
Bellare, M., Canetti, R., Krawczyk, H.: Keying Hash Functions for Message Authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.Ā 1109, pp. 1ā15. Springer, Heidelberg (1996)
Bellare, M., Kilian, J., Rogaway, P.: The Security of Cipher Block Chaining. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.Ā 839, pp. 341ā355. Springer, Heidelberg (1994)
Benadjila, R., Billet, O., Gilbert, H., Macario-Rat, G., Peyrin, T., Robshaw, M., Seurin, Y.: SHA-3 Proposal: ECHO. Submission to NIST (2008), http://crypto.rd.francetelecom.com/echo/
Benadjila, R., Billet, O., Gueron, S., Robshaw, M.J.B.: The Intel AES Instructions Set and the SHA-3 Candidates. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol.Ā 5912, pp. 162ā178. Springer, Heidelberg (2009)
Bernstein, D.J.: CubeHash specification (2.B.1). Submission to NIST, Round 2 (2009)
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Radiogatun, a belt-and-mill hash function. Presented at Second Cryptographic Hash Workshop, Santa Barbara, August 24-25 (2006), http://radiogatun.noekeon.org/
Biham, E., Dunkelman, O.: The SHAvite-3 Hash Function. Submission to NIST, Round 2 (2009), http://www.cs.technion.ac.il/~orrd/SHAvite-3/Spec.15.09.09.pdf
Brassard, G. (ed.): CRYPTO 1989. LNCS, vol.Ā 435. Springer, Heidelberg (1990)
Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, Quisquater (eds.) [21], pp. 16ā29
DamgĆ„rd, I.: A Design Principle for Hash Functions. In: Brassard (ed.) [12], pp. 416ā427
FIPS 197. Advanced Encryption Standard. Federal Information Processing Standards Publication 197, U.S. Department of Commerce/N.I.S.T. (2001)
FIPS 46-3. Data Encryption Standard. Federal Information Processing Standards Publication, U.S. Department of Commerce/N.I.S.T. (1999)
Fouque, P.-A., Leurent, G., RĆ©al, D., Valette, F.: Practical Electromagnetic Template Attack on HMAC. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol.Ā 5747, pp. 66ā80. Springer, Heidelberg (2009)
Gauravaram, P., Knudsen, L.R., Matusiewicz, K., Mendel, F., Rechberger, C., SchlƤffer, M., Thomsen, S.S.: GrĆøstl ā a SHA-3 candidate. Submission to NIST (2008), http://www.groestl.info
Gauravaram, P., Okeya, K.: An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions. In: Srinathan, K., Pandu Rangan, C., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol.Ā 4859, pp. 393ā403. Springer, Heidelberg (2007)
Golic, J.D., Tymen, C.: Multiplicative Masking and Power Analysis of AES. In: Jr, et al. (eds.) [22], pp. 198ā212
Joye, M., Quisquater, J.-J. (eds.): CHES 2004, MA, USA, August 11-13. LNCS, vol.Ā 3156. Springer, Heidelberg (2004)
Kaliski Jr., B.S., KoƧ, Ć.K., Paar, C. (eds.): CHES 2002. LNCS, vol.Ā 2523. Springer, Heidelberg (2003)
Kelsey, J.: How to Choose SHA-3, http://www.lorentzcenter.nl/lc/web/2008/309/presentations/Kelsey.pdf
Knudsen, L.R., Rechberger, C., Thomsen, S.S.: The Grindahl Hash Functions. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol.Ā 4593, pp. 39ā57. Springer, Heidelberg (2007)
Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.Ā 1666, pp. 388ā397. Springer, Heidelberg (1999)
Kƶnighofer, R.: A Fast and Cache-Timing Resistant Implementation of the AES. In: Malkin, T.G. (ed.) CT-RSA 2008. LNCS, vol.Ā 4964, pp. 187ā202. Springer, Heidelberg (2008)
Lemke, K., Schramm, K., Paar, C.: DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction. In: Joye, Quisquater (eds.) [21], pp. 205ā219
McEvoy, R.P., Tunstall, M., Murphy, C.C., Marnane, W.P.: Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures. In: Kim, S., Yung, M., Lee, H.-W. (eds.) WISA 2007. LNCS, vol.Ā 4867, pp. 317ā332. Springer, Heidelberg (2008)
Merkle, R.C.: One Way Hash Functions and DES. In: Brassard (ed.) [12], pp. 428ā446
NationalĀ Institute ofĀ Standards and Technology. FIPS 180-1: Secure Hash Standard (April 1995), http://csrc.nist.gov
National Institute of Standards and Technology. FIPS PUB 197, Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197, U.S. Department of Commerce (2001)
National Institute of Standards and Technology. Announcing Request for Candidate Algorithm Nominations for a NewCryptographic Hash Algorithm (SHA-3) Family. Federal Register, 27(212):62212ā62220 (November 2007), http://csrc.nist.gov/groups/ST/hash/documents/FR_Notice_Nov07.pdf (2008/10/17)
NIST. FIPS 198 ā The Keyed-Hash Message Authentication Code (HMAC) (2002)
Okeya, K.: Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol.Ā 4058, pp. 432ā443. Springer, Heidelberg (2006)
KĆ¼cĆ¼k, Ć.: The Hash Function Hamsi. Submission to NIST (updated) (2009)
Rivest, R.L.: RFC 1321: The MD5 Message-Digest Algorithm (April 1992), http://www.ietf.org/rfc/rfc1321.txt
Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.Ā 3621, pp. 17ā36. Springer, Heidelberg (2005)
Wang, X., Yu, H.: How to Break MD5 and Other Hash Functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.Ā 3494, pp. 19ā35. Springer, Heidelberg (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
Ā© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
BenoƮt, O., Peyrin, T. (2010). Side-Channel Analysis of Six SHA-3 Candidates. In: Mangard, S., Standaert, FX. (eds) Cryptographic Hardware and Embedded Systems, CHES 2010. CHES 2010. Lecture Notes in Computer Science, vol 6225. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15031-9_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-15031-9_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15030-2
Online ISBN: 978-3-642-15031-9
eBook Packages: Computer ScienceComputer Science (R0)