Title :
Side-Channel Analysis of MAC-Keccak
Author :
Taha, Mostafa ; Schaumont, Patrick
Author_Institution :
Bradley Dept. of Electr. & Comput. Eng., Virginia Tech, Blacksburg, VA, USA
Abstract :
NIST recently completed the SHA-3 competition with the selection of Keccak as the new standard for crypto-graphic hashing. In this paper, we present a comprehensive Side-Channel Analysis of Keccak, when it is used with a secret key to generate a Message Authentication Code (MAC) (MAC-Keccak). Our analysis covers all the variations of the algorithm. We show that the side-channel resistance of the MAC-Keccak depends on the key-length used, and we derive the optimum key-length as ((n * rate) - 1), where (n ∈ [2 : ∞]) and rate is the Keccak input block size. Finally, the paper demonstrates the feasibility of our side-channel analysis with a practical attack against MAC-Keccak implemented on a 32-bit Microblaze processor.
Keywords :
cryptography; message authentication; Keccak input block size; MAC-Keccak code; Microblaze processor; SHA-3 competition; cryptographic hashing; message authentication code; optimum key length; practical attack; side channel analysis; side channel resistance; Algorithm design and analysis; Correlation; Forgery; Noise; Power demand; Security; Software;
Conference_Titel :
Hardware-Oriented Security and Trust (HOST), 2013 IEEE International Symposium on
Conference_Location :
Austin, TX
Print_ISBN :
978-1-4799-0559-1
DOI :
10.1109/HST.2013.6581577