Efficient side-channel secure message authentication with better bounds

  • Chun Guo
  • , François Xavier Standaert
  • , Weijia Wang
  • , Yu Yu

Research output: Contribution to journalArticlepeer-review

6 Scopus citations

Abstract

We investigate constructing message authentication schemes from symmetric cryptographic primitives, with the goal of achieving security when most intermediate values during tag computation and verification are leaked (i.e., mode-level leakage-resilience). Existing efficient proposals typically follow the plain Hash-then-MAC paradigm T = TGenK(H(M)). When the domain of the MAC function TGenK is {0, 1}128, e.g., when instantiated with the AES, forgery is possible within time 264 and data complexity 1. To dismiss such cheap attacks, we propose two modes: LRW1-based Hash-then-MAC (LRWHM) that is built upon the LRW1 tweakable blockcipher of Liskov, Rivest, and Wagner, and Rekeying Hash-then-MAC (RHM) that employs internal rekeying. Built upon secure AES implementations, LRWHM is provably secure up to (beyond-birthday) 278.3 time complexity, while RHM is provably secure up to 2121 time. Thus in practice, their main security threat is expected to be side-channel key recovery attacks against the AES implementations. Finally, we benchmark the performance of instances of our modes based on the AES and SHA3 and confirm their efficiency.

Original languageEnglish
Pages (from-to)23-53
Number of pages31
JournalIACR Transactions on Symmetric Cryptology
Volume2019
Issue number4
DOIs
StatePublished - 2019
Externally publishedYes

Keywords

  • Beyond-birthday-bound
  • Hash-then-MAC
  • MAC
  • Message authentication
  • Side-channel security

Fingerprint

Dive into the research topics of 'Efficient side-channel secure message authentication with better bounds'. Together they form a unique fingerprint.

Cite this