Abstract
In October 2012 NIST announced that the SHA-3 hash standard will be based on Keccak. Besides hashing, Keccak can be used in many other modes, including ones operating on a secret value. Many applications of such modes require protection against side-channel attacks, preferably at low cost. In this paper, we present threshold implementations (TI) of Keccak with three and four shares that build further on unprotected parallel and serial architectures. We improve upon earlier TI implementations of Keccak in the sense that the latter did not achieve uniformity of shares. In our proposals we do achieve uniformity at the cost of an extra share in a four-share version or at the cost of injecting a small number of fresh random bits for each computed round. The proposed implementations are efficient and provably secure against first-order side-channel attacks.
Original language | Undefined |
---|---|
Title of host publication | 12th Smart Card Research and Advanced Application Conference (CARDIS) |
Editors | A. Francillon, P. Rohatgi |
Place of Publication | Switzerland |
Publisher | Springer |
Pages | 187-199 |
Number of pages | 13 |
ISBN (Print) | 978-3-319-08302-5 |
DOIs | |
Publication status | Published - Nov 2013 |
Event | 12th Smart Card Research and Advanced Application Conference, CARDIS 2013 - Berlin, Germany Duration: 27 Nov 2013 → 29 Nov 2013 Conference number: 12 |
Publication series
Name | Lecture Notes in Computer Science |
---|---|
Publisher | Springer International Publishing |
Number | 8419 |
Volume | 8419 |
Conference
Conference | 12th Smart Card Research and Advanced Application Conference, CARDIS 2013 |
---|---|
Abbreviated title | CARDIS 2013 |
Country/Territory | Germany |
City | Berlin |
Period | 27/11/13 → 29/11/13 |
Keywords
- EWI-24466
- IR-91871
- METIS-305854