TY - GEN
T1 - Differential fault analysis on HAS-160 compression function
AU - Kang, Jinkeon
AU - Jeong, Kitae
AU - Sung, Jaechul
AU - Hong, Seokhie
PY - 2012
Y1 - 2012
N2 - In FDTC 2011, Hemme et al. proposed differential fault analysis on SHA-1 compression function. Based on word-oriented fault models, this attack can recover the chaining value and the input message block of SHA-1 compression function with 1,002 random word fault injections. In this paper, we show that their attack can be applied to HAS-160 compression function. As a result, our attack can extract the chaining value and the input message block of it with about 1,000 random word fault injections. This is the first known cryptanalytic result on HAS-160 by using side channel attacks.
AB - In FDTC 2011, Hemme et al. proposed differential fault analysis on SHA-1 compression function. Based on word-oriented fault models, this attack can recover the chaining value and the input message block of SHA-1 compression function with 1,002 random word fault injections. In this paper, we show that their attack can be applied to HAS-160 compression function. As a result, our attack can extract the chaining value and the input message block of it with about 1,000 random word fault injections. This is the first known cryptanalytic result on HAS-160 by using side channel attacks.
KW - Cryptanalysis
KW - Differential fault analysis
KW - HAS-160
UR - http://www.scopus.com/inward/record.url?scp=84868586958&partnerID=8YFLogxK
U2 - 10.1007/978-94-007-5699-1_11
DO - 10.1007/978-94-007-5699-1_11
M3 - Conference contribution
AN - SCOPUS:84868586958
SN - 9789400756984
T3 - Lecture Notes in Electrical Engineering
SP - 97
EP - 105
BT - Computer Science and Its Applications, CSA 2012
T2 - 4th FTRA International Conference on Computer Science and Its Applications, CSA 2012
Y2 - 22 November 2012 through 25 November 2012
ER -