References of "Biryukov, Alex 50000799"
     in
Bookmark and Share    
See detailDesign of a New Stream Cipher - LEX
Biryukov, Alex UL

Part of book (2008)

Detailed reference viewed: 134 (3 UL)
Full Text
Peer Reviewed
See detailTwo New Techniques of Side-Channel Cryptanalysis
Biryukov, Alex UL; Khovratovich, Dmitry UL

in Cryptographic Hardware and Embedded Systems - CHES 2007 (2007)

We describe two new techniques of side-channel cryptanalysis which we call the impossible collision attack and the multiset collision attack. These are inspired by the state-of-the-art cryptanalytic ... [more ▼]

We describe two new techniques of side-channel cryptanalysis which we call the impossible collision attack and the multiset collision attack. These are inspired by the state-of-the-art cryptanalytic techniques of impossible differential attacks [BihamBS99] and partial-function collision attacks [GilbertM00] respectively. Using these techniques on an example of the AES we show that one has to mask all the rounds of a 128-bit key AES in order to prevent such attacks. For example these attacks can be used to break a recent proposal by Schramm et al. [SchrammP06] of high order masking for the AES, since it protects only 3 external rounds. [less ▲]

Detailed reference viewed: 184 (4 UL)
Full Text
Peer Reviewed
See detailCollision Attacks on AES-Based MAC: Alpha-MAC
Biryukov, Alex UL; Bogdanov, Andrey; Khovratovich, Dmitry UL et al

in Cryptographic Hardware and Embedded Systems - CHES 2007 (2007)

Message Authentication Code construction Alred and its AES-based instance Alpha-MAC were introduced by Daemen and Rijmen in 2005. We show that under certain assumptions about its implementation (namely ... [more ▼]

Message Authentication Code construction Alred and its AES-based instance Alpha-MAC were introduced by Daemen and Rijmen in 2005. We show that under certain assumptions about its implementation (namely that keyed parts are perfectly protected against side-channel attacks but bulk hashing rounds are not) one can efficiently attack this function. We propose a side-channel collision attack on this MAC recovering its internal state just after 29 measurements in the known-message scenario which is to be compared to 40 measurements required by collision attacks on AES in the chosen-plaintext scenario. Having recovered the internal state, we mount a selective forgery attack using new 4 to 1 round collisions working with negligible memory and time complexity. [less ▲]

Detailed reference viewed: 161 (0 UL)
See detailFast Software Encryption 14th International Workshop, FSE 2007
Biryukov, Alex UL

Book published by Springer (2007)

Detailed reference viewed: 67 (2 UL)