Cryptology ePrint Archive: Report 2010/447

Side-channel Analysis of Six SHA-3 Candidates

Olivier Benoit and Thomas Peyrin

Abstract: In this paper we study six 2nd round SHA-3 candidates from a side-channel cryptanalysis point of view. For each of them, we give the exact procedure and appropriate choice of selection functions to perform the attack. Depending on their inherent structure and the internal primitives used (Sbox, addition or XOR), some schemes are more prone to side channel analysis than others, as shown by our simulations.

Category / Keywords: secret-key cryptography / side-channel, hash function, cryptanalysis, HMAC, SHA-3

Publication Info: published at CHES 2010

Date: received 17 Aug 2010, last revised 20 Aug 2010

Contact author: thomas peyrin at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20100820:081446 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]