Two Step Power Attack on SHA-3 Based MAC
Autor: | Chun-Yi Chu, Marcin Lukowiak |
---|---|
Rok vydání: | 2018 |
Předmět: |
Computer science
business.industry Hash function 02 engineering and technology 020202 computer hardware & architecture SHA-3 Data integrity 0202 electrical engineering electronic engineering information engineering Key (cryptography) NIST 020201 artificial intelligence & image processing Message authentication code Side channel attack Hardware_ARITHMETICANDLOGICSTRUCTURES Field-programmable gate array business Computer network |
Zdroj: | MIXDES |
DOI: | 10.23919/mixdes.2018.8436910 |
Popis: | Because of the recent break of the SHA-l hash function, it is expected that in the nearest future there will be an increasing interest in the new SHA-3 algorithm. SHA-3 implements a subset of the Keccak family and has been released as the NIST standard in 2015. SHA-3 based MAC is a keyed-hash message authentication function, which can be used to verify both the data integrity of the message and its source. Previous work demonstrated successful side channel attacks, in particular power attacks on hardware implementations of the SHA-3 based MAC. This work presents a new two step practical attack against SHA-3 based MAC implemented on an FPGA hardware. This new attack can successfully extract the 320-bit secret key with 200,000 traces at 90% success rate. |
Databáze: | OpenAIRE |
Externí odkaz: |