Key-recovery attacks against the MAC algorithm Chaskey

Abstract : Chaskey is a Message Authentication Code (MAC) for 32-bit microcontrollers proposed by Mouha et al. at SAC 2014. Its underlying blockcipher uses an Even-Mansour construction with a permutation based on the ARX methodology. In this paper, we present keyrecovery attacks against Chaskey in the single and multi-user setting. These attacks are based on recent work by Fouque, Joux and Mavromati presented at Asiacrypt 2014 on Even-Mansour based constructions. We first show a simple attack on the classical single-user setting which confirms the security properties of Chaskey. Then, we describe an attack in the multi-user setting and we recover all keys of 2 43 users by doing 2 43 queries per user. Finally, we show a variant of this attack where we are able to recover keys of two users in a smaller group of 2 32 users. © Springer International Publishing Switzerland 2016.
Document type :
Conference papers
Complete list of metadatas

https://hal.uvsq.fr/hal-02177216
Contributor : Équipe Hal Uvsq <>
Submitted on : Monday, July 8, 2019 - 5:12:00 PM
Last modification on : Wednesday, July 10, 2019 - 1:30:33 AM

Identifiers

Collections

Citation

C. Mavromati. Key-recovery attacks against the MAC algorithm Chaskey. 22nd International Conference on Selected Areas in Cryptography, SAC 2015, Aug 2015, sackville, Canada. pp.205-216, ⟨10.1007/978-3-319-31301-6_12⟩. ⟨hal-02177216⟩

Share

Metrics

Record views

17