Side-Channel Analysis of MAC-Keccak

被引:0
|
作者
Taha, Mostafa [1 ]
Schaumont, Patrick [1 ]
机构
[1] Virginia Tech, Bradley Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
NIST recently completed the SHA-3 competition with the selection of Keccak as the new standard for cryptographic hashing. In this paper, we present a comprehensive SideChannel Analysis of Keccak, when it is used with a secret key to generate a Message Authentication Code (MAC) (MAC-Keccak). Our analysis covers all the variations of the algorithm. We show that the side-channel resistance of the MAC-Keccak depends on the key-length used, and we derive the optimum key-length as ((n * rate) -1), where (n is an element of [2 : infinity) and rate is the Keccak input block size. Finally, the paper demonstrates the feasibility of our side-channel analysis with a practical attack against MACKeccak implemented on a 32-bit Microblaze processor.
引用
收藏
页码:125 / 130
页数:6
相关论文
共 50 条
  • [31] Profiled Side-Channel Analysis in the Efficient Attacker Framework
    Picek, Stjepan
    Heuser, Annelie
    Perin, Guilherme
    Guilley, Sylvain
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2021), 2022, 13173 : 44 - 63
  • [32] Side-Channel Analysis of Montgomery's Representation Randomization
    Jaulmes, Eliane
    Prouff, Emmanuel
    Wild, Justine
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2014, 2014, 8781 : 212 - 227
  • [33] Hydraulic analysis of side-channel spillways as reservoir outlets
    Etheridge, M.J.
    Journal of the Chartered Institution of Water and Environment Management, 1996, 10 (04): : 245 - 252
  • [34] Machine learning in side-channel analysis: a first study
    Hospodar, Gabriel
    Gierlichs, Benedikt
    De Mulder, Elke
    Verbauwhede, Ingrid
    Vandewalle, Joos
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2011, 1 (04) : 293 - 302
  • [35] Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation
    Kasper, Timo
    Oswald, David
    Paar, Christof
    RFID SECURITY AND PRIVACY, 2012, 7055 : 61 - 77
  • [36] Learning-based Side-Channel Analysis on PIPO
    Woo, Ji-Eun
    Han, Jaeseung
    Kim, Yeon-Jae
    Mun, Hye-Won
    Lim, Seonghyuck
    Lee, Tae-Ho
    An, Seong-Hyun
    Kim, Soo-Jin
    Han, Dong-Guk
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2021, 2022, 13218 : 308 - 321
  • [37] When Failure Analysis Meets Side-Channel Attacks
    Di-Battista, Jerome
    Courrege, Jean-Christophe
    Rouzeyre, Bruno
    Torres, Lionel
    Perdu, Philippe
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2010, 2010, 6225 : 188 - +
  • [38] The hydraulic analysis of side-channel spillways as reservoir outlets
    Etheridge, MJ
    JOURNAL OF THE CHARTERED INSTITUTION OF WATER AND ENVIRONMENTAL MANAGEMENT, 1996, 10 (04): : 245 - 252
  • [39] Symbolic path cost analysis for side-channel detection
    University of California Santa Barbara, Santa Barbara
    CA, United States
    不详
    CA, United States
    ISSTA - Proc. ACM SIGSOFT Int. Symp. Softw. Test. Anal., (27-37):
  • [40] On the Performance of Convolutional Neural Networks for Side-Channel Analysis
    Picek, Stjepan
    Samiotis, Ioannis Petros
    Kim, Jaehun
    Heuser, Annelie
    Bhasin, Shivam
    Legay, Axel
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2018, 2018, 11348 : 157 - 176