Differential fault analysis on HAS-160 compression function

Jinkeon Kang, Kitae Jeong, Jaechul Sung, Seokhie Hong

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

In FDTC 2011, Hemme et al. proposed differential fault analysis on SHA-1 compression function. Based on word-oriented fault models, this attack can recover the chaining value and the input message block of SHA-1 compression function with 1,002 random word fault injections. In this paper, we show that their attack can be applied to HAS-160 compression function. As a result, our attack can extract the chaining value and the input message block of it with about 1,000 random word fault injections. This is the first known cryptanalytic result on HAS-160 by using side channel attacks.

Original languageEnglish
Title of host publicationComputer Science and Its Applications, CSA 2012
Pages97-105
Number of pages9
DOIs
StatePublished - 2012
Event4th FTRA International Conference on Computer Science and Its Applications, CSA 2012 - Jeju Island, Korea, Republic of
Duration: 22 Nov 201225 Nov 2012

Publication series

NameLecture Notes in Electrical Engineering
Volume203 LNEE
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Conference

Conference4th FTRA International Conference on Computer Science and Its Applications, CSA 2012
Country/TerritoryKorea, Republic of
CityJeju Island
Period22/11/1225/11/12

Keywords

  • Cryptanalysis
  • Differential fault analysis
  • HAS-160

Fingerprint

Dive into the research topics of 'Differential fault analysis on HAS-160 compression function'. Together they form a unique fingerprint.

Cite this