Differential fault analysis on HAS-160 compression function

Jinkeon Kang, Kitae Jeong, Jaechul Sung, Seokhie Hong

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In FDTC 2011, Hemme et al. proposed differential fault analysis on SHA-1 compression function. Based on word-oriented fault models, this attack can recover the chaining value and the input message block of SHA-1 compression function with 1,002 random word fault injections. In this paper, we show that their attack can be applied to HAS-160 compression function. As a result, our attack can extract the chaining value and the input message block of it with about 1,000 random word fault injections. This is the first known cryptanalytic result on HAS-160 by using side channel attacks.

Original languageEnglish
Title of host publicationComputer Science and Its Applications, CSA 2012
Pages97-105
Number of pages9
DOIs
Publication statusPublished - 2012 Nov 12
Event4th FTRA International Conference on Computer Science and Its Applications, CSA 2012 - Jeju Island, Korea, Republic of
Duration: 2012 Nov 222012 Nov 25

Publication series

NameLecture Notes in Electrical Engineering
Volume203 LNEE
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Other

Other4th FTRA International Conference on Computer Science and Its Applications, CSA 2012
CountryKorea, Republic of
CityJeju Island
Period12/11/2212/11/25

    Fingerprint

Keywords

  • Cryptanalysis
  • Differential fault analysis
  • HAS-160

ASJC Scopus subject areas

  • Industrial and Manufacturing Engineering

Cite this

Kang, J., Jeong, K., Sung, J., & Hong, S. (2012). Differential fault analysis on HAS-160 compression function. In Computer Science and Its Applications, CSA 2012 (pp. 97-105). (Lecture Notes in Electrical Engineering; Vol. 203 LNEE). https://doi.org/10.1007/978-94-007-5699-1_11