Paper 2015/834

Authentication Using Side-Channel Information

Kazuo Sakiyama, Takanori Machida, Arisa Matsubara, Yunfeng Kuai, Yu-ichi Hayashi, Takaaki Mizuki, Noriyuki Miura, and Makoto Nagata

Abstract

Authentication based on cryptographic protocols is a key technology for recent security systems. However, the so-called relay attack where a malicious attacker tries to assume the role of the prover, is known to be a serious threat even for the cryptographically-secure authentication systems. This paper proposes a new authentication method that utilizes the side channel that already exists in many authentication systems. The side channel has been studied intensively from the attacker viewpoint, and it is best known for the key-recovery attack against cryptographic implementations via physical information. Here, reversing our way of thinking, we propose to use the information constructively via the side channel to enhance the existing cryptographic protocols. Using symmetric-key-based authentication as an example, we show based on experiments using an FPGA that each of the side-channel information leaked from provers is unique enough for the purpose of authentication.

Metadata
Available format(s)
-- withdrawn --
Category
Applications
Publication info
Preprint. MINOR revision.
Keywords
side-channel analysisrelay attackstwo-factor authentication
Contact author(s)
machida @ uec ac jp
History
2016-03-25: withdrawn
2015-08-28: received
See all versions
Short URL
https://ia.cr/2015/834
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.