Power Analysis Attacks on the Customizable MK-3 Authenticated Encryption Algorithm

MK-3 is an authenticated encryption scheme based on the duplex sponge construction, suitable for both hardware and software. It provides broad factory and field customization features. The same security claims are valid for the original and all recommended customizations. Extensive security analyses...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:2023 30th International Conference on Mixed Design of Integrated Circuits and System (MIXDES) s. 154 - 159
Hlavní autoři: Fabinski, Peter, Farris, Steve, Kurdziel, Michael, Lukowiak, Marcin, Radziszowski, Stanislaw
Médium: Konferenční příspěvek
Jazyk:angličtina
Vydáno: Lodz University of Technology 29.06.2023
Témata:
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract MK-3 is an authenticated encryption scheme based on the duplex sponge construction, suitable for both hardware and software. It provides broad factory and field customization features. The same security claims are valid for the original and all recommended customizations. Extensive security analyses of MK-3 were performed in our previous work: differential, linear, cube, and brute force attacks, as well as statistical analysis. In this work we report on new experiments involving Correlation Power Analysis (CPA), which is considered one of the most powerful side-channel attack (SCA) techniques. Two CPA attacks on MK-3 were developed: the first directly after the key absorption, and the second after the S-boxes in the first round of IV absorption. In the first attack, under strong assumptions about an attacker's capability to collect traces, we can recover 128 of the 512 state bits in a physical test on an FPGA. The second attack builds on top of the first one, but it assumes that special registers have been embedded after the S-boxes. Even under such ideal conditions, this attack can potentially reduce the brute-forcing difficulty only by an additional 88 to 194 bits. Overall, this gives the CPA attack no advantage over brute-forcing for the original 128-bit key. The previous and current results ensure that MK-3 and its customized versions effectively conceal its plaintext input.
AbstractList MK-3 is an authenticated encryption scheme based on the duplex sponge construction, suitable for both hardware and software. It provides broad factory and field customization features. The same security claims are valid for the original and all recommended customizations. Extensive security analyses of MK-3 were performed in our previous work: differential, linear, cube, and brute force attacks, as well as statistical analysis. In this work we report on new experiments involving Correlation Power Analysis (CPA), which is considered one of the most powerful side-channel attack (SCA) techniques. Two CPA attacks on MK-3 were developed: the first directly after the key absorption, and the second after the S-boxes in the first round of IV absorption. In the first attack, under strong assumptions about an attacker's capability to collect traces, we can recover 128 of the 512 state bits in a physical test on an FPGA. The second attack builds on top of the first one, but it assumes that special registers have been embedded after the S-boxes. Even under such ideal conditions, this attack can potentially reduce the brute-forcing difficulty only by an additional 88 to 194 bits. Overall, this gives the CPA attack no advantage over brute-forcing for the original 128-bit key. The previous and current results ensure that MK-3 and its customized versions effectively conceal its plaintext input.
Author Fabinski, Peter
Radziszowski, Stanislaw
Kurdziel, Michael
Lukowiak, Marcin
Farris, Steve
Author_xml – sequence: 1
  givenname: Peter
  surname: Fabinski
  fullname: Fabinski, Peter
  email: pnf9945@rit.edu
  organization: Rochester Institute of Technology,Department of Computer Engineering
– sequence: 2
  givenname: Steve
  surname: Farris
  fullname: Farris, Steve
  email: Steve.Farris@L3Harris.com
  organization: L3Harris Technologies
– sequence: 3
  givenname: Michael
  surname: Kurdziel
  fullname: Kurdziel, Michael
  email: Mike.Kurdziel@L3Harris.com
  organization: L3Harris Technologies
– sequence: 4
  givenname: Marcin
  surname: Lukowiak
  fullname: Lukowiak, Marcin
  email: mxleec@rit.edu
  organization: Rochester Institute of Technology,Department of Computer Engineering
– sequence: 5
  givenname: Stanislaw
  surname: Radziszowski
  fullname: Radziszowski, Stanislaw
  email: spr@cs.rit.edu
  organization: Rochester Institute of Technology,Department of Computer Engineering
BookMark eNo1j01Lw0AURUfQha3-AxeD-8SZ9ybpZBlitMUWxQ9wV2aSVzuYTEoyReKvN6AuLhcOlwN3xk5954mxayliwExmN5vV-235kugkhRgEYCwFCASVnbCZxhSThQaU5-z5qfuinufeNOPgBp6HYKrPgXeehz3x4jiErnXfxjbENw8R8vw4cR9cZQLVvPRVPx6Cm-Z589H1LuzbC3a2M81Al389Z2935WuxjNaP96siX0cOhAqRVmRrgdJWlSJNujZAqTJkpSHSEuROZ2DRENqFkSlYIJWASkVCU2qLc3b163VEtD30rjX9uP3_iT_ppU81
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.23919/MIXDES58562.2023.10203249
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library (IEL) (UW System Shared)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 8363578231
9788363578237
836357824X
9788363578244
EndPage 159
ExternalDocumentID 10203249
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i204t-84ebd031bcc4e8e8da2e64aeb1aee8121f892b3ae3b7a162b2e4524605e605db3
IEDL.DBID RIE
ISICitedReferencesCount 1
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001050841200027&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
IngestDate Wed Aug 27 02:15:24 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i204t-84ebd031bcc4e8e8da2e64aeb1aee8121f892b3ae3b7a162b2e4524605e605db3
PageCount 6
ParticipantIDs ieee_primary_10203249
PublicationCentury 2000
PublicationDate 2023-June-29
PublicationDateYYYYMMDD 2023-06-29
PublicationDate_xml – month: 06
  year: 2023
  text: 2023-June-29
  day: 29
PublicationDecade 2020
PublicationTitle 2023 30th International Conference on Mixed Design of Integrated Circuits and System (MIXDES)
PublicationTitleAbbrev MIXDES
PublicationYear 2023
Publisher Lodz University of Technology
Publisher_xml – name: Lodz University of Technology
Score 1.8438861
Snippet MK-3 is an authenticated encryption scheme based on the duplex sponge construction, suitable for both hardware and software. It provides broad factory and...
SourceID ieee
SourceType Publisher
StartPage 154
SubjectTerms Absorption
Correlation
correlation power analysis
customizable encryption
Encryption
FPGA
Resistance
Side-channel attacks
Software
sponge construction
Statistical analysis
Title Power Analysis Attacks on the Customizable MK-3 Authenticated Encryption Algorithm
URI https://ieeexplore.ieee.org/document/10203249
WOSCitedRecordID wos001050841200027&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEA62ePCkYsU3OXjd2k2yu8mx1BZFW4oveit5zGrB7sq6Ffz3ZtJW8eDBQyAEksCEeTD5vhlCzo2xUiTgIzewSSS0yiOjLY-SRErt1-I8lBR6us1GIzmZqPGKrB64MAAQwGfQxmn4y3elXWCqzGs49vsWqkEaWZYuyVrLQqKMq1hdDK8nl_17HwCnSLFivL3e8Kt1SvAcg-1_3rlDWj8cPDr-9i67ZAOKPXI3xqZmdF1JhHbrGjnytCyoD-Rob-FDuTnitF6BDm8iTjEDhnggxD052i9s9RlsBO2-PpfVrH6Zt8jjoP_Qu4pWXRGiGeuIOpICjPOqaKwVIEE6zSAV2ttcDeDddZxLxQzXwE2m45QZBiJh-P0JfjjD90mzKAs4INTwFBIHSvI0F0IL6axUWSz8kZoJ3TkkLRTI9G1Z-GK6lsXRH-vHZAvFjkgqpk5Is64WcEo27Uc9e6_OwnN9AWv4mPc
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NSwMxEA1aBT2pWPHbHLxu7Saz2-RYaktLPyhapbeSZGd1od2VdSv47022reLBg4dACCSBDJMZkvfeEHKrtREQoM3c0AQeKBl7WhnuBYEQyo75cSkp9DxojEZiOpXjNVm95MIgYgk-w5rrln_5UWaW7qnMerir9w1ym-wEAKy-omutpEQZl768G_am9-1HmwKHjmTFeG0z5VfxlDJ2dA7-ueshqf6w8Oj4O74ckS1Mj8nD2JU1oxstEdosCseSp1lKbSpHW0ubzC0cUmuOdNj3OHVvYA4R5JBPEW2nJv8sbwnanL9keVK8LqrkqdOetLreui6Cl7A6FJ4A1JF1Rm0MoEARKYYhKHvrKkQbsP1YSKa5Qq4byg-ZZggBcx-gaFuk-QmppFmKp4RqHmIQoRQ8jAEUiMgI2fDBLqkYqPoZqboDmb2tpC9mm7M4_2P8hux1J8PBbNAb9S_IvjOBw1UxeUkqRb7EK7JrPorkPb8uTfcFj9-cPg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2023+30th+International+Conference+on+Mixed+Design+of+Integrated+Circuits+and+System+%28MIXDES%29&rft.atitle=Power+Analysis+Attacks+on+the+Customizable+MK-3+Authenticated+Encryption+Algorithm&rft.au=Fabinski%2C+Peter&rft.au=Farris%2C+Steve&rft.au=Kurdziel%2C+Michael&rft.au=Lukowiak%2C+Marcin&rft.date=2023-06-29&rft.pub=Lodz+University+of+Technology&rft.spage=154&rft.epage=159&rft_id=info:doi/10.23919%2FMIXDES58562.2023.10203249&rft.externalDocID=10203249