Jan. 17, 2024, 1 p.m. |

IACR News www.iacr.org

ePrint Report: A Study of Soft Analytical Side-Channel Attacks on Secure Hash Algorithms

Julien Maillard, Thomas Hiscock, Maxime Lecomte, Christophe Clavier


Hashing algorithms are one-way functions that are used in cryptographic protocols as Pseudo Random Functions (PRF), to assess data integrity or to create a Hash-based Message Authentication Code (HMAC). In many cryptographic constructions, secret data is processed with hashing functions. In these cases, recovering the input given to the hashing algorithm allows retrieving secret data. In this paper, we …

algorithms attacks authentication channel code cryptographic data data integrity eprint report functions hash hash algorithms hashing integrity message protocols random report side-channel side-channel attacks study thomas

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC