Side-Channel Analysis of MAC-Keccak

被引:0
|
作者
Taha, Mostafa [1 ]
Schaumont, Patrick [1 ]
机构
[1] Virginia Tech, Bradley Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
NIST recently completed the SHA-3 competition with the selection of Keccak as the new standard for cryptographic hashing. In this paper, we present a comprehensive SideChannel Analysis of Keccak, when it is used with a secret key to generate a Message Authentication Code (MAC) (MAC-Keccak). Our analysis covers all the variations of the algorithm. We show that the side-channel resistance of the MAC-Keccak depends on the key-length used, and we derive the optimum key-length as ((n * rate) -1), where (n is an element of [2 : infinity) and rate is the Keccak input block size. Finally, the paper demonstrates the feasibility of our side-channel analysis with a practical attack against MACKeccak implemented on a 32-bit Microblaze processor.
引用
收藏
页码:125 / 130
页数:6
相关论文
共 50 条
  • [21] DIFFuzz: Differential Fuzzing for Side-Channel Analysis
    Nilizadeh, Shirin
    Noller, Yannic
    Pasareanu, Corina S.
    2019 IEEE/ACM 41ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2019), 2019, : 176 - 187
  • [22] Abacus: A Tool for Precise Side-channel Analysis
    Bao, Qinkun
    Wang, Zihao
    Larus, James R.
    Wu, Dinghao
    2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: COMPANION PROCEEDINGS (ICSE-COMPANION 2021), 2021, : 238 - 239
  • [23] Photonic Side-Channel Analysis of Arbiter PUFs
    Tajik, Shahin
    Nedospasov, Dmitry
    Seifert, Jean-Pierre
    Dietz, Enrico
    Frohmann, Sven
    Dittrich, Helmar
    Huebers, Heinz-Wilhelm
    Helfmeier, Clemens
    Boit, Christian
    JOURNAL OF CRYPTOLOGY, 2017, 30 (02) : 550 - 571
  • [24] Photonic Side-Channel Analysis of Arbiter PUFs
    Shahin Tajik
    Enrico Dietz
    Sven Frohmann
    Helmar Dittrich
    Dmitry Nedospasov
    Clemens Helfmeier
    Jean-Pierre Seifert
    Christian Boit
    Heinz-Wilhelm Hübers
    Journal of Cryptology, 2017, 30 : 550 - 571
  • [25] Side-Channel Analysis of PUFs and Fuzzy Extractors
    Merli, Dominik
    Schuster, Dieter
    Stumpf, Frederic
    Sigl, Georg
    TRUST AND TRUSTWORTHY COMPUTING, TRUST 2011, 2011, 6740 : 33 - 47
  • [26] Algebraic Side-Channel Analysis in the Presence of Errors
    Oren, Yossef
    Kirschbaum, Mario
    Popp, Thomas
    Wool, Avishai
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2010, 2010, 6225 : 428 - +
  • [27] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
    Jin, Shan
    Xu, Minghua
    Cai, Yiwei
    39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
  • [28] CDAE: Towards Empowering Denoising in Side-Channel Analysis
    Yang, Guang
    Li, Huizhong
    Ming, Jingdian
    Zhou, Yongbin
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 269 - 286
  • [29] NeuroSCA: Evolving Activation Functions for Side-Channel Analysis
    Knezevic, Karlo
    Fulir, Juraj
    Jakobovic, Domagoj
    Picek, Stjepan
    Durasevic, Marko
    IEEE ACCESS, 2023, 11 : 284 - 299
  • [30] Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation
    Kasper, Timo
    Oswald, David
    Paar, Christof
    RFID: SECURITY AND PRIVACY: 7TH INTERNATIONALWORKSHOP, RFIDSEC 2011, 2012, 7055 : 61 - 77