International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Side-channel Analysis of Six SHA-3 Candidates

Authors:
Olivier Benoit
Thomas Peyrin
Download:
URL: http://eprint.iacr.org/2010/447
Search ePrint
Search Google
Abstract: In this paper we study six 2nd round SHA-3 candidates from a side-channel cryptanalysis point of view. For each of them, we give the exact procedure and appropriate choice of selection functions to perform the attack. Depending on their inherent structure and the internal primitives used (Sbox, addition or XOR), some schemes are more prone to side channel analysis than others, as shown by our simulations.
BibTeX
@misc{eprint-2010-23348,
  title={Side-channel Analysis of Six SHA-3 Candidates},
  booktitle={IACR Eprint archive},
  keywords={secret-key cryptography / side-channel, hash function, cryptanalysis, HMAC, SHA-3},
  url={http://eprint.iacr.org/2010/447},
  note={published at CHES 2010 thomas.peyrin@gmail.com 14841 received 17 Aug 2010, last revised 20 Aug 2010},
  author={Olivier Benoit and Thomas Peyrin},
  year=2010
}