Machine-checked proofs for cryptographic standards indifferentiability of sponge and secure high-assurance implementations of SHA-3

  • José Bacelar Almeida
  • , Gilles Barthe
  • , Vincent Laporte
  • , Cécile Baritel-Ruet
  • , François Dupressoir
  • , Tiago Oliveira
  • , Pierre Yves Strub
  • , Manuel Barbosa
  • , Benjamin Grégoire
  • , Alley Stoughton

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We present a high-assurance and high-speed implementation of the SHA-3 hash function. Our implementation is written in the Jasmin programming language, and is formally verified for functional correctness, provable security and timing attack resistance in the EasyCrypt proof assistant. Our implementation is the first to achieve simultaneously the four desirable properties (efficiency, correctness, provable security, and side-channel protection) for a non-trivial cryptographic primitive. Concretely, our mechanized proofs show that: 1) the SHA-3 hash function is indifferentiable from a random oracle, and thus is resistant against collision, first and second preimage attacks; 2) the SHA-3 hash function is correctly implemented by a vectorized x86 implementation. Furthermore, the implementation is provably protected against timing attacks in an idealized model of timing leaks. The proofs include new EasyCrypt libraries of independent interest for programmable random oracles and modular indifferentiability proofs.

Original languageEnglish
Title of host publicationCCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
PublisherAssociation for Computing Machinery
Pages1607-1622
Number of pages16
ISBN (Electronic)9781450367479
DOIs
Publication statusPublished - 6 Nov 2019
Event26th ACM SIGSAC Conference on Computer and Communications Security, CCS 2019 - London, United Kingdom
Duration: 11 Nov 201915 Nov 2019

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Conference

Conference26th ACM SIGSAC Conference on Computer and Communications Security, CCS 2019
Country/TerritoryUnited Kingdom
CityLondon
Period11/11/1915/11/19

Keywords

  • EasyCrypt
  • High-assurance cryptography
  • Indifferentiability
  • Jasmin
  • SHA-3

Fingerprint

Dive into the research topics of 'Machine-checked proofs for cryptographic standards indifferentiability of sponge and secure high-assurance implementations of SHA-3'. Together they form a unique fingerprint.

Cite this