Exploiting the leakage: Analysis of some authenticated encryption schemes

2Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The ongoing CAESAR competition, aimed at finding robust and secure authenticated encryption schemes provides many new submissions for analysis. We analyzed many schemes and came across a plenitude of techniques, design ideals and security notions. In view of the above, we present key recovery attacks using DPA for Deoxys, Joltik and ELmD, and a forgery attack on AEGIS. In our analysis of the various schemes, we found out that, schemes using Sponge constructions with pre-initialized keys such as Ascon, ICEPOLE, Keyak, NORX, PRIMATEs, etc. were significantly harder to attack than contemporary designs using standard building blocks from a side channel perspective. We also implement and demonstrate an attack on Joltik-BC, to recover the key in roughly 50–60 traces.

Cite

CITATION STYLE

APA

Chang, D., Chauhan, A. K., Gupta, N., Jati, A., & Sanadhya, S. K. (2016). Exploiting the leakage: Analysis of some authenticated encryption schemes. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10076 LNCS, pp. 383–401). Springer Verlag. https://doi.org/10.1007/978-3-319-49445-6_22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free