Power analysis attacks on the SHA-3 candidate Grøstl

Show full item record

Title: Power analysis attacks on the SHA-3 candidate Grøstl
Author: Smith, Garrett
Abstract: Side-channel attacks refer to a particular form of cryptanalysis in which sensitive data is revealed through information extracted from the physical implementation of a cryptosystem. An unprotected device may leak details related to operations performed on secret information through unintended inputs and outputs known as side-channels. Examples of side-channel information include power consumption, operation timing, or any other intelligence-bearing signal. Unlike traditional cryptanalytic methods, such as linear and differential cryptanalysis, side-channel attacks may be used to break cryptographic systems with no known weaknesses in the algorithm's mathematical structure. Many of these attacks may also be performed using relatively cheap and easily obtained measurement equipment, making them a significant concern for both the algorithm's design and implementation. The focus of this thesis was the implementation of a methodology for performing power analysis attacks, a type of side-channel attack in which secret information is revealed through the instantaneous power consumption of a circuit. Specifically, an attack framework was developed and applied to both protected and unprotected hardware models of the SHA-3 finalist Grøstl using gate-level circuit simulation. The results indicate that Grøstl, due to its similarities to the AES block cipher, is vulnerable to the same attacks, but also benefits from a great deal of existing research devoted to the development of effective countermeasures for AES-based devices.
Record URI: http://hdl.handle.net/1850/15414
Date: 2012-08

Files in this item

Files Size Format View
GSmithThesis8-2012.pdf 8.069Mb PDF View/Open

The following license files are associated with this item:

This item appears in the following Collection(s)

Show full item record

Search RIT DML


Advanced Search

Browse