Abstract
In FDTC 2011, Hemme et al. proposed differential fault analysis on SHA-1 compression function. Based on word-oriented fault models, this attack can recover the chaining value and the input message block of SHA-1 compression function with 1,002 random word fault injections. In this paper, we show that their attack can be applied to HAS-160 compression function. As a result, our attack can extract the chaining value and the input message block of it with about 1,000 random word fault injections. This is the first known cryptanalytic result on HAS-160 by using side channel attacks.
Original language | English |
---|---|
Title of host publication | Computer Science and Its Applications, CSA 2012 |
Pages | 97-105 |
Number of pages | 9 |
DOIs | |
Publication status | Published - 2012 |
Event | 4th FTRA International Conference on Computer Science and Its Applications, CSA 2012 - Jeju Island, Korea, Republic of Duration: 2012 Nov 22 → 2012 Nov 25 |
Publication series
Name | Lecture Notes in Electrical Engineering |
---|---|
Volume | 203 LNEE |
ISSN (Print) | 1876-1100 |
ISSN (Electronic) | 1876-1119 |
Other
Other | 4th FTRA International Conference on Computer Science and Its Applications, CSA 2012 |
---|---|
Country/Territory | Korea, Republic of |
City | Jeju Island |
Period | 12/11/22 → 12/11/25 |
Bibliographical note
Funding Information:This research was supported by the Ministry of Knowledge Economy (MKE), Korea, under the Information Technology Research Center (ITRC) support program (NIPA-2012-H0301-12-3007) supervised by the National IT Industry Promotion Agency (NIPA).
Keywords
- Cryptanalysis
- Differential fault analysis
- HAS-160
ASJC Scopus subject areas
- Industrial and Manufacturing Engineering