Power Analysis Attacks on the Customizable MK-3 Authenticated Encryption Algorithm

被引:0
|
作者
Fabinski, Peter [1 ]
Farris, Steve [2 ]
Kurdziel, Michael [2 ]
Lukowiak, Marcin [1 ]
Radziszowski, Stanislaw [1 ]
机构
[1] Rochester Inst Technol, Dept Comp Engn, Rochester, NY 14623 USA
[2] L3Harris Technol, Melbourne, FL USA
来源
2023 30TH INTERNATIONAL CONFERENCE ON MIXED DESIGN OF INTEGRATED CIRCUITS AND SYSTEM, MIXDES | 2023年
关键词
FPGA; side-channel attacks; correlation power analysis; customizable encryption; sponge construction;
D O I
10.23919/MIXDES58562.2023.10203249
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
MK-3 is an authenticated encryption scheme based on the duplex sponge construction, suitable for both hardware and software. It provides broad factory and field customization features. The same security claims are valid for the original and all recommended customizations. Extensive security analyses of MK-3 were performed in our previous work: differential, linear, cube, and brute force attacks, as well as statistical analysis. In this work we report on new experiments involving Correlation Power Analysis (CPA), which is considered one of the most powerful side-channel attack (SCA) techniques. Two CPA attacks on MK-3 were developed: the first directly after the key absorption, and the second after the S-boxes in the first round of IV absorption. In the first attack, under strong assumptions about an attacker's capability to collect traces, we can recover 128 of the 512 state bits in a physical test on an FPGA. The second attack builds on top of the first one, but it assumes that special registers have been embedded after the S-boxes. Even under such ideal conditions, this attack can potentially reduce the brute-forcing difficulty only by an additional 88 to 194 bits. Overall, this gives the CPA attack no advantage over brute-forcing for the original 128-bit key. The previous and current results ensure that MK-3 and its customized versions effectively conceal its plaintext input.
引用
收藏
页码:154 / 159
页数:6
相关论文
共 7 条
  • [1] On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks
    Moradi, Amir
    Barenghi, Alessandro
    Kasper, Timo
    Paar, Christof
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 111 - 123
  • [2] Research and implementation of large-scale S-box for MK-3 algorithm based on polynomial basis: in FPGA
    Hong, Ruipeng
    Zhang, Lei
    Pan, Zhankun
    Xiao, Chaoen
    Wang, Jianxin
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2025, 15 (01)
  • [3] Vulnerability of Advanced Encryption Standard algorithm to Differential Power Analysis attacks implemented on ATmega-128 microcontroller
    Mpalane, Kealeboga
    Gasela, Naison
    Esiefarienrhe, B. M.
    Tsague, H. D.
    2016 THIRD INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND PATTERN RECOGNITION (AIPR), 2016,
  • [4] SEAMS: A Symmetric Encryption Algorithm Modification System to Resist Power Based Side Channel Attacks
    Pathirana, K. P. A. P.
    Lankarathne, L. R. M. O.
    Hangawaththa, N. H. A. D. A.
    Abeywardena, K. Y.
    Kuruwitaarachchi, N.
    INTELLIGENT COMPUTING, VOL 2, 2019, 857 : 965 - 976
  • [5] Invariant of Enhanced AES Algorithm Implementations Against Power Analysis Attacks
    Ansari, Nadia Mustaqim
    Hussain, Rashid
    Arif, Sheeraz
    Hussain, Syed Sajjad
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01): : 1861 - 1875
  • [6] Differential power analysis of dynamic password token based on SM3 algorithm, and countermeasures
    Guo, Limin
    Wang, Lihui
    Li, Qing
    Yu, Jun
    Luo, Peng
    2015 11TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2015, : 354 - 357
  • [7] A Differential Power Analysis Attack on Dynamic Password Token Based On SM3 Algorithm
    Guo, Limin
    Li, Qing
    Wang, Lihui
    Zhang, Zhimin
    Liu, Dan
    Shan, Weijun
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND ELECTRONIC TECHNOLOGY, 2015, 3 : 107 - 110