Paper 2010/447
Side-channel Analysis of Six SHA-3 Candidates
Olivier Benoit and Thomas Peyrin
Abstract
In this paper we study six 2nd round SHA-3 candidates from a side-channel cryptanalysis point of view. For each of them, we give the exact procedure and appropriate choice of selection functions to perform the attack. Depending on their inherent structure and the internal primitives used (Sbox, addition or XOR), some schemes are more prone to side channel analysis than others, as shown by our simulations.
Metadata
- Available format(s)
- Category
- Secret-key cryptography
- Publication info
- Published elsewhere. published at CHES 2010
- Keywords
- side-channelhash functioncryptanalysisHMACSHA-3
- Contact author(s)
- thomas peyrin @ gmail com
- History
- 2010-08-20: revised
- 2010-08-18: received
- See all versions
- Short URL
- https://ia.cr/2010/447
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2010/447, author = {Olivier Benoit and Thomas Peyrin}, title = {Side-channel Analysis of Six {SHA}-3 Candidates}, howpublished = {Cryptology {ePrint} Archive, Paper 2010/447}, year = {2010}, url = {https://eprint.iacr.org/2010/447} }