Repository logo
 

A Template Attack to Reconstruct the Input of SHA-3 on an 8-Bit Device

Accepted version
Peer-reviewed

Loading...
Thumbnail Image

Type

Conference Object

Change log

Authors

You, SC 
Kuhn, MG 

Abstract

We present an enumeration procedure based on a template attack to recover the complete input text of a SHA-3 implementation on an 8-bit microprocessor from a single trace of a power-analysis side channel. This attack targets 600 bytes of triple-redundant internal state in each invocation of the permutation used by SHA-3. We first build templates that can generate for each of these bytes a rank table of all 256 candidates. The templates we obtained for our 8-bit target CPU nearly identified the correct value of most target bytes directly, rather than just gathering information about their Hamming weights. We then search the full intermediate state of the Keccak permutation to eliminate remaining uncertainties about the recovered byte values. From the resulting intermediate states we finally reconstruct both the input and output of SHA-3 and verify the output. In our experimental evaluation of this procedure we achieved success rates higher than 99%.

Description

Keywords

Template attack, SHA-3, Keccak, Enumeration trees

Journal Title

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Conference Name

Constructive Side-Channel Analysis and Secure Design

Journal ISSN

0302-9743
1611-3349

Volume Title

12244 LNCS

Publisher

Springer International Publishing

Rights

All rights reserved
Sponsorship
Cambridge Trust Ministry of Education, Taiwan