Robust message authentication in the context of quantum key distribution

No Thumbnail Available

Date

2022

Journal Title

Journal ISSN

Volume Title

Publisher

Inderscience Publishers

Abstract

Universal hashing-based message authentication code (MAC) is used as the de facto method to achieve information-theoretically secure authentication in quantum key distribution. We present a critical look at the most widely used type, namely Wegman-Carter MAC based on polynomial hashing and analyse its robustness against physical attacks exploiting side information. In particular, we mount a classical DPA attack on the hash part of the Wegman-Carter MAC which leads to a possible intercept-and-resend attack on the BB84-like QKD protocols. We illustrate this case with polynomial-evaluation MACs as their variants are used in commercial QKD systems. We show that our attack methodology is much simpler compared to that of Belaid et al. at ASIACRYPT 2014. Finally, we present an algebraic countermeasure so that the resulting MAC is not susceptible to the identified attack. © 2022 Inderscience Enterprises Ltd.

Description

Keywords

Authentication, Information theory, Polynomials, DPA attacks, Information leakage, Message authentication, Message authentication codes, Physical attacks, Polynomial evaluation, Polynomial-evaluation MAC, Secure authentications, Side information, Universal hashing, Quantum cryptography

Citation

International Journal of Information and Computer Security, 2022, 18, 46115, pp. 365-382

Collections

Endorsement

Review

Supplemented By

Referenced By