Paper 2019/1424

Efficient Side-Channel Secure Message Authentication with Better Bounds

Chun Guo, François-Xavier Standaert, Weijia Wang, and Yu Yu

Abstract

We investigate constructing message authentication schemes from symmetric cryptographic primitives, with the goal of achieving security when most intermediate values during tag computation and verification are leaked (i.e., mode-level leakage-resilience). Existing efficient proposals typically follow the plain Hash-then-MAC paradigm $T=MAC_K(H(M))$. When the domain of the MAC function $MAC_K$ is $\{0,1\}^{128}$, e.g., when instantiated with the AES, forgery is possible within time $2^{64}$ and data complexity 1. To dismiss such cheap attacks, we propose two modes: LRW1-based Hash-then-MAC (LRWHM) that is built upon the LRW1 tweakable blockcipher of Liskov, Rivest, and Wagner, and Rekeying Hash-then-MAC (RHM) that employs internal rekeying. Built upon secure AES implementations, LRWHM is provably secure up to (beyond-birthday) $2^{78.3}$ time complexity, while RHM is provably secure up to $2^{121}$ time. Thus in practice, their main security threat is expected to be side-channel key recovery attacks against the AES implementations. Finally, we benchmark the performance of instances of our modes based on the AES and SHA3 and confirm their efficiency.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
A minor revision of an IACR publication in FSE 2020
Keywords
Message authenticationMACside-channel securityHash-then-MACbeyond-birthday-boundcomputing on encrypted data
Contact author(s)
chun guo @ sdu edu cn
History
2019-12-10: received
Short URL
https://ia.cr/2019/1424
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2019/1424,
      author = {Chun Guo and François-Xavier Standaert and Weijia Wang and Yu Yu},
      title = {Efficient Side-Channel Secure Message Authentication with Better Bounds},
      howpublished = {Cryptology {ePrint} Archive, Paper 2019/1424},
      year = {2019},
      url = {https://eprint.iacr.org/2019/1424}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.