Side-Channel Analysis of MAC-Keccak

被引:0
|
作者
Taha, Mostafa [1 ]
Schaumont, Patrick [1 ]
机构
[1] Virginia Tech, Bradley Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
NIST recently completed the SHA-3 competition with the selection of Keccak as the new standard for cryptographic hashing. In this paper, we present a comprehensive SideChannel Analysis of Keccak, when it is used with a secret key to generate a Message Authentication Code (MAC) (MAC-Keccak). Our analysis covers all the variations of the algorithm. We show that the side-channel resistance of the MAC-Keccak depends on the key-length used, and we derive the optimum key-length as ((n * rate) -1), where (n is an element of [2 : infinity) and rate is the Keccak input block size. Finally, the paper demonstrates the feasibility of our side-channel analysis with a practical attack against MACKeccak implemented on a 32-bit Microblaze processor.
引用
收藏
页码:125 / 130
页数:6
相关论文
共 50 条
  • [1] Power Analysis Attack on Hardware Implementation of MAC-Keccak on FPGAs
    Luo, Pei
    Fei, Yunsi
    Fang, Xin
    Ding, A. Adam
    Leeser, Miriam
    Kaeli, David R.
    2014 INTERNATIONAL CONFERENCE ON RECONFIGURABLE COMPUTING AND FPGAS (RECONFIG), 2014,
  • [2] Higher-Order Side-Channel Protected Implementations of KECCAK
    Gross, Hannes
    Schaffenrath, David
    Mangard, Stefan
    2017 EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2017, : 205 - 212
  • [3] Trade-offs in Protecting KECCAK Against Combined Side-Channel and Fault Attacks
    Purnal, Antoon
    Arribas, Victor
    De Meyer, Lauren
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 : 285 - 302
  • [4] Side-Channel Analysis of Keymill
    Dobraunig, Christoph
    Eichlseder, Maria
    Korak, Thomas
    Mendel, Florian
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, 2017, 10348 : 138 - 152
  • [5] On XTR and side-channel analysis
    Page, D
    Stam, M
    SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 54 - 68
  • [6] On XTR and side-channel analysis
    Page, Daniel
    Stam, Martijn
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2004, 3357 : 54 - 68
  • [7] Single-Trace Side-Channel Analysis on Polynomial-Based MAC Schemes
    Ueno, Rei
    Fukushima, Kazuhide
    Nakano, Yuto
    Kiyomoto, Shinsaku
    Homma, Naofumi
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2020), 2021, 12244 : 43 - 67
  • [8] Federated Learning in Side-Channel Analysis
    Wang, Huanyu
    Dubrova, Elena
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2020, 2021, 12593 : 257 - 272
  • [9] Side-Channel Analysis of the TERO PUF
    Tebelmann, Lars
    Pehl, Michael
    Immler, Vincent
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 : 43 - 60
  • [10] Abacus: Precise Side-Channel Analysis
    Bao, Qinkun
    Wang, Zihao
    Li, Xiaoting
    Larus, James R.
    Wu, Dinghao
    2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2021), 2021, : 797 - 809