Power Analysis Attacks on the Customizable MK-3 Authenticated Encryption Algorithm
MK-3 is an authenticated encryption scheme based on the duplex sponge construction, suitable for both hardware and software. It provides broad factory and field customization features. The same security claims are valid for the original and all recommended customizations. Extensive security analyses...
Saved in:
| Published in: | 2023 30th International Conference on Mixed Design of Integrated Circuits and System (MIXDES) pp. 154 - 159 |
|---|---|
| Main Authors: | , , , , |
| Format: | Conference Proceeding |
| Language: | English |
| Published: |
Lodz University of Technology
29.06.2023
|
| Subjects: | |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | MK-3 is an authenticated encryption scheme based on the duplex sponge construction, suitable for both hardware and software. It provides broad factory and field customization features. The same security claims are valid for the original and all recommended customizations. Extensive security analyses of MK-3 were performed in our previous work: differential, linear, cube, and brute force attacks, as well as statistical analysis. In this work we report on new experiments involving Correlation Power Analysis (CPA), which is considered one of the most powerful side-channel attack (SCA) techniques. Two CPA attacks on MK-3 were developed: the first directly after the key absorption, and the second after the S-boxes in the first round of IV absorption. In the first attack, under strong assumptions about an attacker's capability to collect traces, we can recover 128 of the 512 state bits in a physical test on an FPGA. The second attack builds on top of the first one, but it assumes that special registers have been embedded after the S-boxes. Even under such ideal conditions, this attack can potentially reduce the brute-forcing difficulty only by an additional 88 to 194 bits. Overall, this gives the CPA attack no advantage over brute-forcing for the original 128-bit key. The previous and current results ensure that MK-3 and its customized versions effectively conceal its plaintext input. |
|---|---|
| AbstractList | MK-3 is an authenticated encryption scheme based on the duplex sponge construction, suitable for both hardware and software. It provides broad factory and field customization features. The same security claims are valid for the original and all recommended customizations. Extensive security analyses of MK-3 were performed in our previous work: differential, linear, cube, and brute force attacks, as well as statistical analysis. In this work we report on new experiments involving Correlation Power Analysis (CPA), which is considered one of the most powerful side-channel attack (SCA) techniques. Two CPA attacks on MK-3 were developed: the first directly after the key absorption, and the second after the S-boxes in the first round of IV absorption. In the first attack, under strong assumptions about an attacker's capability to collect traces, we can recover 128 of the 512 state bits in a physical test on an FPGA. The second attack builds on top of the first one, but it assumes that special registers have been embedded after the S-boxes. Even under such ideal conditions, this attack can potentially reduce the brute-forcing difficulty only by an additional 88 to 194 bits. Overall, this gives the CPA attack no advantage over brute-forcing for the original 128-bit key. The previous and current results ensure that MK-3 and its customized versions effectively conceal its plaintext input. |
| Author | Fabinski, Peter Radziszowski, Stanislaw Kurdziel, Michael Lukowiak, Marcin Farris, Steve |
| Author_xml | – sequence: 1 givenname: Peter surname: Fabinski fullname: Fabinski, Peter email: pnf9945@rit.edu organization: Rochester Institute of Technology,Department of Computer Engineering – sequence: 2 givenname: Steve surname: Farris fullname: Farris, Steve email: Steve.Farris@L3Harris.com organization: L3Harris Technologies – sequence: 3 givenname: Michael surname: Kurdziel fullname: Kurdziel, Michael email: Mike.Kurdziel@L3Harris.com organization: L3Harris Technologies – sequence: 4 givenname: Marcin surname: Lukowiak fullname: Lukowiak, Marcin email: mxleec@rit.edu organization: Rochester Institute of Technology,Department of Computer Engineering – sequence: 5 givenname: Stanislaw surname: Radziszowski fullname: Radziszowski, Stanislaw email: spr@cs.rit.edu organization: Rochester Institute of Technology,Department of Computer Engineering |
| BookMark | eNo1j01Lw0AURUfQha3-AxeD-8SZ9ybpZBlitMUWxQ9wV2aSVzuYTEoyReKvN6AuLhcOlwN3xk5954mxayliwExmN5vV-235kugkhRgEYCwFCASVnbCZxhSThQaU5-z5qfuinufeNOPgBp6HYKrPgXeehz3x4jiErnXfxjbENw8R8vw4cR9cZQLVvPRVPx6Cm-Z589H1LuzbC3a2M81Al389Z2935WuxjNaP96siX0cOhAqRVmRrgdJWlSJNujZAqTJkpSHSEuROZ2DRENqFkSlYIJWASkVCU2qLc3b163VEtD30rjX9uP3_iT_ppU81 |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.23919/MIXDES58562.2023.10203249 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 8363578231 9788363578237 836357824X 9788363578244 |
| EndPage | 159 |
| ExternalDocumentID | 10203249 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IL CBEJK RIE RIL |
| ID | FETCH-LOGICAL-i204t-84ebd031bcc4e8e8da2e64aeb1aee8121f892b3ae3b7a162b2e4524605e605db3 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 1 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001050841200027&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| IngestDate | Wed Aug 27 02:15:24 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i204t-84ebd031bcc4e8e8da2e64aeb1aee8121f892b3ae3b7a162b2e4524605e605db3 |
| PageCount | 6 |
| ParticipantIDs | ieee_primary_10203249 |
| PublicationCentury | 2000 |
| PublicationDate | 2023-June-29 |
| PublicationDateYYYYMMDD | 2023-06-29 |
| PublicationDate_xml | – month: 06 year: 2023 text: 2023-June-29 day: 29 |
| PublicationDecade | 2020 |
| PublicationTitle | 2023 30th International Conference on Mixed Design of Integrated Circuits and System (MIXDES) |
| PublicationTitleAbbrev | MIXDES |
| PublicationYear | 2023 |
| Publisher | Lodz University of Technology |
| Publisher_xml | – name: Lodz University of Technology |
| Score | 1.8439902 |
| Snippet | MK-3 is an authenticated encryption scheme based on the duplex sponge construction, suitable for both hardware and software. It provides broad factory and... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 154 |
| SubjectTerms | Absorption Correlation correlation power analysis customizable encryption Encryption FPGA Resistance Side-channel attacks Software sponge construction Statistical analysis |
| Title | Power Analysis Attacks on the Customizable MK-3 Authenticated Encryption Algorithm |
| URI | https://ieeexplore.ieee.org/document/10203249 |
| WOSCitedRecordID | wos001050841200027&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEA62ePCkYsU3OXhNdZO4mxxLbVG0pfiA3koeUy20u7LuCv57J2mrePDgIRACITDJZD6S75sh5BzUNMWDZBnGRsUkB8lsaiXjTibOey91EoXC99lwqMZjPVqJ1aMWBgAi-QzaoRv_8n3h6vBUhh4e6n1L3SCNLEuXYq1lIlEudKIvBrfj694jAuA0SKy4aK8n_CqdEiNHf_ufa-6Q1o8Gj46-o8su2YB8jzyMQlEzus4kQjtVFTTytMgpAjnarRHKLQJPaw50cMcEDS9ggQ8UeE-e9nJXfsY7gnbmL0U5q14XLfLc7z11b9iqKgKb8UtZMSXBenRF65wEBcobDqk0eOcaAAzXyVRpboUBYTOTpNyi_a94-P4EbN6KfdLMixwOCMUZTkj0aQdecm6NyIRBuI2oRjirp4ekFQwyeVsmvpisbXH0x_gx2QpmD0wqrk9IsyprOCWb7qOavZdncbu-ACD-mE4 |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEA5aBT2pWPFtDl5Tu0m6TY6lVlr6oGiF3koeUy20u7JuBf-9k22rePDgIRACIZDJZD6S75sh5BbUNMaDZBnGRsUkB8lsbCXjTkbOey91VAiFe_XBQI3HergWqxdaGAAoyGdQCd3iL9-nbhmeytDDQ71vqbfJTk1KXl3JtVapRLnQkb7rd8b3rSeEwHEQWXFR2Uz5VTyliB0PB_9c9ZCUf1R4dPgdX47IFiTH5HEYyprRTS4R2sjzoJKnaUIRytHmEsHcIjC15kD7XSZoeAMLjKDAfPK0lbjss7glaGP-kmaz_HVRJs8PrVGzzdZ1EdiMV2XOlATr0RmtcxIUKG84xNLgrWsAMGBHU6W5FQaErZso5hYtUOPhAxSweStOSClJEzglFGc4IdGrHXjJuTWiLgwCbsQ1wlk9PSPlsCGTt1Xqi8lmL87_GL8he-1RvzfpdQbdC7IfTBB4VVxfklKeLeGK7LqPfPaeXRem-wI7w5uV |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2023+30th+International+Conference+on+Mixed+Design+of+Integrated+Circuits+and+System+%28MIXDES%29&rft.atitle=Power+Analysis+Attacks+on+the+Customizable+MK-3+Authenticated+Encryption+Algorithm&rft.au=Fabinski%2C+Peter&rft.au=Farris%2C+Steve&rft.au=Kurdziel%2C+Michael&rft.au=Lukowiak%2C+Marcin&rft.date=2023-06-29&rft.pub=Lodz+University+of+Technology&rft.spage=154&rft.epage=159&rft_id=info:doi/10.23919%2FMIXDES58562.2023.10203249&rft.externalDocID=10203249 |