首页> 外文会议>Constructive side-channel analysis and secure design. >Butterfly-Attack on Skein's Modular Addition
【24h】

Butterfly-Attack on Skein's Modular Addition

机译:Skein模块化加法的蝴蝶攻击

获取原文
获取原文并翻译 | 示例

摘要

At the cutting edge of todays security research and development, the SHA-3 contest evaluates a new successor of SHA-2 for secure hashing operations. One of the finalists is the SHA-3 candidate Skein. Like many other cryptographic primitives Skein utilizes arithmetic operations, for instance modular addition. In this paper we introduce a new method of performing a DPA on modular addition of arbitrary length. We will give an overview over side channel analysis of modular addition, followed by problems occurring when dealing with large operand sizes of 32 bits and more. To overcome these problems, we suggest a new method, called the Butterfly-Attack to exploit the leakage of modular additions. Real world application is being shown by applying our new approach to Skein-MAC, enabling us to forge legitimate MACs using Skein.
机译:在当今安全研究和开发的最前沿,SHA-3竞赛评估了SHA-2的新继任者用于安全哈希操作。入围者之一是SHA-3候选Skein。像许多其他密码原语一样,Skein利用算术运算,例如模块化加法。在本文中,我们介绍了一种在任意长度的模块化加法上执行DPA的新方法。我们将对模块化加法的边通道分析进行概述,然后介绍在处理32位及更大的大操作数时出现的问题。为了克服这些问题,我们建议一种称为蝶形攻击的新方法,以利用模块化附加组件的泄漏。通过将我们的新方法应用于Skein-MAC来展示实际应用,从而使我们能够使用Skein伪造合法的MAC。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号