- Tytuł:
- Overview of round one power attacks on SHA-3 Based MAC
- Autorzy:
-
Millar, Kevin
Chu, Chun-Yi
Łukowiak, Marcin - Powiązania:
- https://bibliotekanauki.pl/articles/397819.pdf
- Data publikacji:
- 2018
- Wydawca:
- Politechnika Łódzka. Wydział Mikroelektroniki i Informatyki
- Tematy:
-
SHA-3
power attacks
FPGA
atak energetyczny - Opis:
- Digital signatures and message authentication codes are the two most common applications of cryptographic hash functions. Others range from ensuring data integrity to randomization functions and key derivation. Because of there cent break of the SHA-1 hash function, it is expected that in the nearest future there will be an increasing interest in the new SHA-3 algorithm. SHA-3 implements a subset of the Keccak family and was released as the NIST standard in 2015.SHA-3 based MAC is a keyed-hash message authentication function, which can be used to verify both the data integrity of a message and its source. Though Keccak is cryptographically secure, implementations of the algorithm may be susceptible to power analysis attacks if not sufficiently protected. This work implements and analyzes two correlation power analysis (CPA)attacks targeting the round one operations of a SHA-3 based MAC implementation on an FPGA.
- Źródło:
-
International Journal of Microelectronics and Computer Science; 2018, 9, 3; 114-122
2080-8755
2353-9607 - Pojawia się w:
- International Journal of Microelectronics and Computer Science
- Dostawca treści:
- Biblioteka Nauki