[Resource Topic] 2016/709: Differential Fault Analysis of SHA3-224 and SHA3-256

Welcome to the resource topic for 2016/709

Title:
Differential Fault Analysis of SHA3-224 and SHA3-256

Authors: Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding

Abstract:

The security of SHA-3 against different kinds of attacks are of vital importance for crypto systems with SHA-3 as the security engine. In this paper, we look into the differential fault analysis of SHA-3, and this is the first work to conquer SHA3-224 and SHA3-256 using differential fault analysis. Comparing with one existing related work, we relax the fault models and make them realistic for different implementation architectures. We analyze fault propagation in SHA-3 under such single-byte fault models, and propose to use fault signatures at the observed output for analysis and secret retrieval. Results show that the proposed method can effectively identify the injected single-byte faults, and then recover the whole internal state of the input of last round \chi operation (\chi^{22}_i) for both SHA3-224 and SHA3-256.

ePrint: https://eprint.iacr.org/2016/709

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .