Back to Search Start Over

Collision Attacks on AES-Based MAC: Alpha-MAC.

Authors :
Hutchison, David
Kanade, Takeo
Kittler, Josef
Kleinberg, Jon M.
Mattern, Friedemann
Mitchell, John C.
Naor, Moni
Nierstrasz, Oscar
Pandu Rangan, C.
Steffen, Bernhard
Sudan, Madhu
Terzopoulos, Demetri
Tygar, Doug
Vardi, Moshe Y.
Weikum, Gerhard
Paillier, Pascal
Verbauwhede, Ingrid
Biryukov, Alex
Bogdanov, Andrey
Khovratovich, Dmitry
Source :
Cryptographic Hardware & Embedded Systems - CHES 2007; 2007, p166-180, 15p
Publication Year :
2007

Abstract

Message Authentication Code construction Alred and its AES-based instance Alpha-MAC were introduced by Daemen and Rijmen in 2005. We show that under certain assumptions about its implementation (namely that keyed parts are perfectly protected against side-channel attacks but bulk hashing rounds are not) one can efficiently attack this function. We propose a side-channel collision attack on this MAC recovering its internal state just after 29 measurements in the known-message scenario which is to be compared to 40 measurements required by collision attacks on AES in the chosen-plaintext scenario. Having recovered the internal state, we mount a selective forgery attack using new 4 to 1 round collisions working with negligible memory and time complexity. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISBNs :
9783540747345
Database :
Complementary Index
Journal :
Cryptographic Hardware & Embedded Systems - CHES 2007
Publication Type :
Book
Accession number :
33148441
Full Text :
https://doi.org/10.1007/978-3-540-74735-2_12