Jan. 17, 2024, 1 p.m. |

IACR News www.iacr.org

ePrint Report: A Study of Soft Analytical Side-Channel Attacks on Secure Hash Algorithms

Julien Maillard, Thomas Hiscock, Maxime Lecomte, Christophe Clavier


Hashing algorithms are one-way functions that are used in cryptographic protocols as Pseudo Random Functions (PRF), to assess data integrity or to create a Hash-based Message Authentication Code (HMAC). In many cryptographic constructions, secret data is processed with hashing functions. In these cases, recovering the input given to the hashing algorithm allows retrieving secret data. In this paper, we …

algorithms attacks authentication channel code cryptographic data data integrity eprint report functions hash hash algorithms hashing integrity message protocols random report side-channel side-channel attacks study thomas

Sr Security Engineer - Colombia

@ Nubank | Colombia, Bogota

Security Engineer, Investigations - i3

@ Meta | Menlo Park, CA | Washington, DC | Remote, US

Cyber Security Engineer

@ ASSYSTEM | Bridgwater, United Kingdom

Security Analyst

@ Northwestern Memorial Healthcare | Chicago, IL, United States

GRC Analyst

@ Richemont | Shelton, CT, US

Security Specialist

@ Peraton | Government Site, MD, United States