Advertisement

Differential Power Analysis of MAC-Keccak at Any Key-Length

  • Mostafa Taha
  • Patrick Schaumont
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8231)

Abstract

Keccak is a new hash function selected by NIST as the next SHA-3 standard. Keccak supports the generation of Message Authentication Codes (MACs) by hashing the direct concatenation of a variable-length key and the input message. As a result, changing the key-length directly changes the set of internal operations that need to be targeted with Differential Power Analysis. The proper selection of these target operations becomes a new challenge for MAC-Keccak, in particular when some key bytes are hidden under a hierarchical dependency structure. In this paper, we propose a complete Differential Power Analysis of MAC-Keccak under any key-length using a systematic approach to identify the required target operations. The attack is validated by successfully breaking several, practically difficult, case studies of MAC-Keccak, implemented with the reference software code on a 32-bit Microblaze processor.

Keywords

Unknown Variable Intermediate Variable Message Authentication Code Internal Operation Input Message 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Keccak reference code submission to NIST (round 3), http://csrc.nist.gov/groups/ST/hash/sha-3/Round3/documents/Keccak_FinalRnd.zip
  2. 2.
    Xilinx microblaze soft processor core, http://www.xilinx.com/tools/microblaze.htm
  3. 3.
    RSA cryptography standard PKCS# 1 v2.2. RSA Laboratories, p. 63 (2012)Google Scholar
  4. 4.
    Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1–15. Springer, Heidelberg (1996)Google Scholar
  5. 5.
    Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Cryptographic sponge functions 0.1 (2011), http://sponge.noekeon.org/CSF-0.1.pdf
  6. 6.
    Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The keccak reference. Submission to NIST (Round 3) 3.0 (2011), http://keccak.noekeon.org/Keccak-reference-3.0.pdf
  7. 7.
    Bertoni, G., Daemen, J., Debande, N., Le, T.H., Peeters, M., Assche, G.V.: Power Analysis of Hardware Implementations Protected with Secret Sharing (2013), published: Cryptology ePrint Archive, Report 2013/067, http://eprint.iacr.org/
  8. 8.
    Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The keccak SHA-3 submission. Submission to NIST (Round 3) (2011)Google Scholar
  9. 9.
    Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16–29. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  10. 10.
    Daemen, J., Bertoni, G., Peeters, M., Van Assche, G., Van Keer, R.: Keccak implementation overview. Technical report, NIST (2012)Google Scholar
  11. 11.
    Daemen, J., Rijmen, V.: The Design of Rijndael. Springer-Verlag New York, Inc., Secaucus (2002)CrossRefzbMATHGoogle Scholar
  12. 12.
    Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–789. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  13. 13.
    McEvoy, R., Tunstall, M., Murphy, C.C., Marnane, W.P.: Differential power analysis of HMAC based on SHA-2, and countermeasures. In: Kim, S., Yung, M., Lee, H.-W. (eds.) WISA 2007. LNCS, vol. 4867, pp. 317–332. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  14. 14.
    Taha, M., Schaumont, P.: Side-channel analysis of MAC-Keccak. In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) (June 2013)Google Scholar
  15. 15.
    Zohner, M., Kasper, M., Stöttinger, M., Huss, S.: Side channel analysis of the SHA-3 finalists. In: Design, Automation Test in Europe Conference Exhibition (DATE), pp. 1012–1017 (March 2012)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Mostafa Taha
    • 1
  • Patrick Schaumont
    • 1
  1. 1.Secure Embedded Systems, Center for Embedded Systems for Critical Applications Bradley Department of ECEVirginia TechBlacksburgUSA

Personalised recommendations