Side-Channel Analysis of Grøstl and Skein

Christina Boura, Sylvain Lévêque, David Vigilant
2012 2012 IEEE Symposium on Security and Privacy Workshops  
This work 1 provides a detailed study of two finalists of the SHA-3 competition from the sidechannel analysis point of view. For both functions when used as a MAC, this paper presents detected strategies for performing a power analysis. Besides the classical HMAC mode, two additionally proposed constructions, the envelope MAC for Grøstl and the Skein-MAC for Skein, are analyzed. Consequently, examples of software countermeasures thwarting first-order DPA or CPA are given. For the validation of
more » ... ur choices, we implemented HMAC-Grøstl, HMAC-Skein as well as countermeasures on a 32-bit ARM-based smart card. We also mounted power analysis attacks in practice on both unprotected and protected implementations. Finally, the performance difference between both versions is discussed.
doi:10.1109/spw.2012.13 dblp:conf/sp/BouraLV12 fatcat:35k5uqn7braerhcranx4ddrqvq