PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Overview of round one power attacks on SHA-3 Based MAC

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Digital signatures and message authentication codes are the two most common applications of cryptographic hash functions. Others range from ensuring data integrity to randomization functions and key derivation. Because of there cent break of the SHA-1 hash function, it is expected that in the nearest future there will be an increasing interest in the new SHA-3 algorithm. SHA-3 implements a subset of the Keccak family and was released as the NIST standard in 2015.SHA-3 based MAC is a keyed-hash message authentication function, which can be used to verify both the data integrity of a message and its source. Though Keccak is cryptographically secure, implementations of the algorithm may be susceptible to power analysis attacks if not sufficiently protected. This work implements and analyzes two correlation power analysis (CPA)attacks targeting the round one operations of a SHA-3 based MAC implementation on an FPGA.
Słowa kluczowe
Twórcy
autor
  • Rochester Institute of Technology, Rochester, NY USA
autor
  • Rochester Institute of Technology, Rochester, NY USA
  • Rochester Institute of Technology, Rochester, NY USA
Bibliografia
  • [1] M. Stevens, E. Bursztein, P. Karpman, A. Albertini, Y. Markov,A. P. Bianco, and C. Baisse, “Announcing the first sha1 collision, ”Google Security Blog, Feb. 2017. [Online]. Available: https://security.googleblog.com/2017/02/announcing-first-sha1-collision.html
  • [2] SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, NIST Std., Aug. 2015. [Online]. Available: http://dx.doi.org/10.6028/NIST.FIPS.202
  • [3] P. Luo, Y. Fei, X. Fang, A. A. Ding, D. R. Kaeli, and M. Leeser,“Side-channel analysis of mac-keccak hardware implementations,” in Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, ser. HASP ’15.New York, NY, USA: ACM, 2015, pp. 1:1–1:8. [Online]. Available: http://doi.acm.org/10.1145/2768566.2768567
  • [4] C. Chu and M. Lukowiak, “Two step power attack on sha-3 based mac,”in2018 25th International Conference ”Mixed Design of Integrated Circuits and System” (MIXDES), June 2018, pp. 209–214
  • [5] G. Bertoni, J. Daemen, M. Peeters, and G. V. Assche, “Cryptographic sponge functions,” 2011. [Online]. Available: http://sponge.noekeon.org/CSF-0.1.pdf, 2011
  • [6] M. Taha and P. Schaumont, “Differential power analysis of mac-keccakat any key-length,” in Advances in Information and Computer Security, K. Sakiyama and M. Terada, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013, pp. 68–82
  • [7] P. Luo, Y. Fei, X. Fang, A. A. Ding, M. Leeser, and D. R. Kaeli, “Power analysis attack on hardware implementation of mac-keccak on fpgas,”in2014 International Conference on ReConFigurable Computing and FPGAs (ReConFig14), Dec 2014, pp. 1–7
  • [8] K. Smith and M. Łukowiak, “Methodology for simulated power analysis attacks on aes,” in2010 - MILCOM 2010 MILITARYCOMMUNICATIONS CONFERENCE, Oct 2010, pp. 1292–1297
  • [9] X. D. Tran, M. Łukowiak, and S. P. Radziszowski, “Effectiveness of variable bit-length power analysis attacks on sha-3 based mac,” in MILCOM 2016 - 2016 IEEE Military Communications Conference, Nov2016, pp. 794–799
  • [10] C. Clavier, J.-L. Danger, G. Duc, M. A. Elaabid, B. Gerard,S. Guilley, A. Heuser, M. Kasper, Y. Li, V. Lomn ́e, D. Nakatsu,K. Ohta, K. Sakiyama, L. Sauvage, W. Schindler, M. Stottinger, N. Veyrat-Charvillon, M. Walle, and A.Wurcker, “Practical improvements of side-channel attacks on aes: feedback from the 2nd dpa contest, ”Journal of Cryptographic Engineering, vol. 4, no. 4, pp. 259–274, Nov 2014. [Online]. Available: https://doi.org/10.1007/s13389-014-0075-9
  • [11] “Keccak hardware implementation in vhdl version 3.1.” [Online].Available: http://keccak.noekeon.org/KeccakVHDL-3.1.zip
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-7a40f24a-dc3d-4504-92df-2aa79e302065
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.