Key-recovery attacks against the MAC algorithm Chaskey - Université de Versailles Saint-Quentin-en-Yvelines Accéder directement au contenu
Communication Dans Un Congrès Année : 2016

Key-recovery attacks against the MAC algorithm Chaskey

Résumé

Chaskey is a Message Authentication Code (MAC) for 32-bit microcontrollers proposed by Mouha et al. at SAC 2014. Its underlying blockcipher uses an Even-Mansour construction with a permutation based on the ARX methodology. In this paper, we present keyrecovery attacks against Chaskey in the single and multi-user setting. These attacks are based on recent work by Fouque, Joux and Mavromati presented at Asiacrypt 2014 on Even-Mansour based constructions. We first show a simple attack on the classical single-user setting which confirms the security properties of Chaskey. Then, we describe an attack in the multi-user setting and we recover all keys of 2 43 users by doing 2 43 queries per user. Finally, we show a variant of this attack where we are able to recover keys of two users in a smaller group of 2 32 users. © Springer International Publishing Switzerland 2016.

Dates et versions

hal-02177216 , version 1 (08-07-2019)

Identifiants

Citer

C. Mavromati. Key-recovery attacks against the MAC algorithm Chaskey. 22nd International Conference on Selected Areas in Cryptography, SAC 2015, Aug 2015, sackville, Canada. pp.205-216, ⟨10.1007/978-3-319-31301-6_12⟩. ⟨hal-02177216⟩
23 Consultations
0 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More