【24h】

Differential Fault Analysis of SHA-3

机译:SHA-3的差异故障分析

获取原文

摘要

In this paper we present the first differential fault analysis (DFA) of SHA-3. This attack can recover the internal state of two versions of SHA-3 (namely, SHA3-512 and SHA3-384) and can be used to forge MAC's which are using these versions of SHA-3. Assuming that the attacker can inject a random single bit fault on the intermediate state of the hash computation, and given the output of the SHA-3 version for a correct message and 80 faulty messages, we can extract 1592 out of the 1600 bits of the compression function's internal state. To the best of our knowledge, this is the first public analysis of SHA-3 against DFA. Although our results do not compromise any security claim of SHA-3, it shows the feasibility of DFA on this scheme and possibly other Sponge based MACs and increases our understanding of SHA-3.
机译:在本文中,我们介绍了SHA-3的第一个差分故障分析(DFA)。此攻击可以恢复两个版本的SHA-3版本(即,SHA3-512和SHA3-384),可用于伪造使用这些版本的SHA-3的MAC。假设攻击者可以在散列计算的中间状态上注入随机单位故障,并给出用于正确消息的SHA-3版本的输出和80个故障的消息,我们可以从1600位中提取1592压缩函数的内部状态。据我们所知,这是第一次对DFA的SHA-3公众分析。虽然我们的结果不会损害SHA-3的任何安全要求,但它表明了DFA对该方案的可行性以及可能的其他海绵的MAC,并提高了对SHA-3的理解。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号