Collision-correlation attack against a first-order masking scheme for MAC based on SHA-3

2Citations
Citations of this article
17Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In 2012, Keccak has been selected as the SHA-3 competition winner, and NIST recently announced the standardization of a keyed version for message authentication codes. In this paper, we consider an implementation of this keyed function, protected against first-order side-channel analysis with an efficient masking scheme proposed by the designers. We show that this masking scheme is vulnerable to a non-linear collision-correlation attack. Our attack advantageously needs no assumption on device-depending parameters, and hence constitutes an interesting alternative to second-order differential analysis. © 2014 Springer International Publishing Switzerland.

Cite

CITATION STYLE

APA

Bettale, L., Dottax, E., Genelle, L., & Piret, G. (2014). Collision-correlation attack against a first-order masking scheme for MAC based on SHA-3. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8622 LNCS, pp. 129–143). Springer Verlag. https://doi.org/10.1007/978-3-319-10175-0_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free