Side-Channel Analysis of Six SHA-3 Candidates

  • Olivier Benoît
  • Thomas Peyrin
Conference paper

DOI: 10.1007/978-3-642-15031-9_10

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6225)
Cite this paper as:
Benoît O., Peyrin T. (2010) Side-Channel Analysis of Six SHA-3 Candidates. In: Mangard S., Standaert FX. (eds) Cryptographic Hardware and Embedded Systems, CHES 2010. CHES 2010. Lecture Notes in Computer Science, vol 6225. Springer, Berlin, Heidelberg

Abstract

In this paper we study six 2nd round SHA-3 candidates from a side-channel cryptanalysis point of view. For each of them, we give the exact procedure and appropriate choice of selection functions to perform the attack. Depending on their inherent structure and the internal primitives used (Sbox, addition or XOR), some schemes are more prone to side channel analysis than others, as shown by our simulations.

Keywords

side-channel hash function cryptanalysis HMAC SHA-3 
Download to read the full conference paper text

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Olivier Benoît
    • 1
  • Thomas Peyrin
    • 1
  1. 1.IngenicoFrance

Personalised recommendations