Relaxed Differential Fault Analysis of SHA-3
Authors
Abstract:
In this paper, we propose a new method of differential fault analysis of SHA-3 which is based on the differential relations of the algorithm. Employing those differential relations in the fault analysis of SHA-3 gives new features to the proposed attacks, e.g., the high probability of fault detection and the possibility of re-checking initial faults and the possibility to recover internal state with 22-53 faults. We also present two improvements for the above attack which are using differential relations in reverse direction to improve that attack results and using the algebraic relations of the algorithm to provide a second way to recover the internal state of SHA-3. Consequently, we show that with 5-8 faults on average, SHA-3's internal state can be fully recovered. X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X
similar resources
Differential Fault Analysis of SHA-3 under Relaxed Fault Models
Keccak-based algorithms such as Secure Hash Algorithm-3 (SHA3) will be widely used in crypto systems, and evaluating their security against different kinds of attacks is vitally important. This paper presents an efficient differential fault analysis (DFA) method on all four modes of SHA-3 to recover an entire internal state, which leads to message recovery in the regular hashing mode and key re...
full textProvable Security Analysis of SHA-3 Candidates
Hash functions are fundamental cryptographic primitives that compress messages of arbitrary length into message digests of a fixed length. They are used as the building block in many important security applications such as digital signatures, message authentication codes, password protection, etc. The three main security properties of hash functions are collision, second preimage and preimage r...
full textDifferential Fault Analysis
This report presents the results of the Differential Fault Analysis (DFA) Project. The project was funded by Secure Business Austria (SBA) and A-SIT. Its objective was to perform basic steps in the field of fault injection. The effect of faults was investigated in theory as well as in practice. The first part of this report concentrates on theoretical fault models. New fault attacks on public k...
full textDifferential Fault Analysis Automation
Characterization of all possible faults in a cryptosystem exploitable for fault attacks is a problem which is of both theoretical and practical interest for the cryptographic community. The complete knowledge of exploitable fault space is desirable while designing optimal countermeasures for any given crypto-implementation. In this paper, we address the exploitable fault characterization proble...
full textDifferential Fault Analysis
Commercial ventures and financial institutions have proposed and are relying upon smartcards and other security processors as a method for storing and transacting electronic currency. As users begin to accept electronic wallets as a viable option for storing their assets, the security community has placed these devices under closer scrutiny. The idea of using computational faults to break tampe...
full textDifferential Fault Analysis of LEX
LEX is a stream cipher based on the round transformation of the AES block cipher, and it was selected for the final phase evaluation of the eSTREAM project. LEX is 2.5 times faster than AES both in software and in hardware. In this paper, we present a differential fault attack on LEX. The fault model assumes that the attacker is able to flip a random bit of the internal state of the cipher but ...
full textMy Resources
Journal title
volume 11 issue 2
pages 129- 143
publication date 2019-07-01
By following a journal you will be notified via email when a new issue of this journal is published.
Hosted on Doprax cloud platform doprax.com
copyright © 2015-2023