Sciweavers

CHES
2010
Springer

Side-Channel Analysis of Six SHA-3 Candidates

13 years 5 months ago
Side-Channel Analysis of Six SHA-3 Candidates
Abstract. In this paper we study six 2nd round SHA-3 candidates from a side-channel cryptanalysis point of view. For each of them, we give the exact procedure and appropriate choice of selection functions to perform the attack. Depending on their inherent structure and the internal primitives used (Sbox, addition or XOR), some schemes are more prone to side channel analysis than others, as shown by our simulations. Key words: side-channel, hash function, cryptanalysis, HMAC, SHA-3.
Olivier Benoît, Thomas Peyrin
Added 08 Nov 2010
Updated 08 Nov 2010
Type Conference
Year 2010
Where CHES
Authors Olivier Benoît, Thomas Peyrin
Comments (0)