Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

Side channel analysis of the SHA-3 finalists

: Zohner, M.

Preas, K. ; Institute of Electrical and Electronics Engineers -IEEE-; European Design Automation Association -EDAA-:
Design, Automation & Test in Europe Conference & Exhibition, DATE 2012. Vol.2 : Dresden, Germany, 12 - 16 March 2012; proceedings
Piscataway/NJ: IEEE, 2012
ISBN: 978-3-9810801-8-6
ISBN: 978-1-4577-2145-8
Design, Automation and Test in Europe Conference & Exhibition (DATE) <15, 2012, Dresden>
Fraunhofer SIT ()

At the cutting edge of today's security research and development, the SHA-3 competition evaluates a new secure hashing standard in succession to SHA-2. The five remaining candidates of the SHA-3 competition are BLAKE, Grøstl, JH, Keccak, and Skein. While the main focus was on the algorithmic security of the candidates, a side channel analysis has only been performed for BLAKE and Grøstl [1]. In order to equally evaluate all candidates, we identify side channel attacks on JH-MAC, Keccak-MAC, and Skein-MAC and demonstrate the applicability of the attacks by attacking their respective reference implementation. Additionally, we revisit the side channel analysis of Grøstl and introduce a profiling based side channel attack, which emphasizes the importance of side channel resistant hash functions by recovering the input to the hash function using only the measured power consumption.