Cryptology ePrint Archive: Report 2010/614
An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture
Simon Hoerder and Marcin Wojcik and Stefan Tillich and Dan Page
Abstract: Cryptographic hash functions are an omnipresent components in security-critical software and devices; they support, for example, digital signature and data authenticity schemes, mechanisms for key derivation, pseudo-random number generation and so on. A criteria for candidate hash functions in the SHA-3 contest is resistance against side-channel analysis which is a major concern for mobile devices as well. This paper explores the implementation of said candidates on a variant of the Power-Trust platform; our results highlight this representing a flexible solution to power analysis attacks, implying only a modest performance overhead.
Category / Keywords: implementation / message authentication codes, hash functions, smart cards
Date: received 1 Dec 2010
Contact author: hoerder at compsci bristol ac uk
Available formats: PDF | BibTeX Citation
Version: 20101202:005334 (All versions of this report)
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]