Robust message authentication in the context of quantum key distribution

dc.contributor.authorShanmugam, D.
dc.contributor.authorRamalingam, J.
dc.date.accessioned2026-02-04T12:28:28Z
dc.date.issued2022
dc.description.abstractUniversal hashing-based message authentication code (MAC) is used as the de facto method to achieve information-theoretically secure authentication in quantum key distribution. We present a critical look at the most widely used type, namely Wegman-Carter MAC based on polynomial hashing and analyse its robustness against physical attacks exploiting side information. In particular, we mount a classical DPA attack on the hash part of the Wegman-Carter MAC which leads to a possible intercept-and-resend attack on the BB84-like QKD protocols. We illustrate this case with polynomial-evaluation MACs as their variants are used in commercial QKD systems. We show that our attack methodology is much simpler compared to that of Belaid et al. at ASIACRYPT 2014. Finally, we present an algebraic countermeasure so that the resulting MAC is not susceptible to the identified attack. © 2022 Inderscience Enterprises Ltd.
dc.identifier.citationInternational Journal of Information and Computer Security, 2022, 18, 46115, pp. 365-382
dc.identifier.issn17441765
dc.identifier.urihttps://doi.org/10.1504/ijics.2022.125276
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/22761
dc.publisherInderscience Publishers
dc.subjectAuthentication
dc.subjectInformation theory
dc.subjectPolynomials
dc.subjectDPA attacks
dc.subjectInformation leakage
dc.subjectMessage authentication
dc.subjectMessage authentication codes
dc.subjectPhysical attacks
dc.subjectPolynomial evaluation
dc.subjectPolynomial-evaluation MAC
dc.subjectSecure authentications
dc.subjectSide information
dc.subjectUniversal hashing
dc.subjectQuantum cryptography
dc.titleRobust message authentication in the context of quantum key distribution

Files

Collections