An evaluation of hash functions on a power analysis resistant processor architecture

  • Authors:
  • Simon Hoerder;Marcin Wójcik;Stefan Tillich;Daniel Page

  • Affiliations:
  • Department of Computer Science, University of Bristol;Department of Computer Science, University of Bristol;Department of Computer Science, University of Bristol;Department of Computer Science, University of Bristol

  • Venue:
  • WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Cryptographic hash functions are an omnipresent component in security-critical software and devices; they support digital signature and data authenticity schemes, mechanisms for key derivation, pseudo-random number generation and so on. A criterion for candidate hash functions in the SHA-3 contest is resistance against side-channel analysis which is a major concern especially for mobile devices. This paper explores the implementation of said candidates on a variant of the Power-Trust platform; our results highlight a flexible solution to power analysis attacks, implying only a modest performance overhead.