Re-Keying Scheme Revisited: Security Model and Instantiations

被引:4
|
作者
Komano, Yuichi [1 ]
Hirose, Shoichi [2 ]
机构
[1] Toshiba Co Ltd, Kawasaki, Kanagawa 2128582, Japan
[2] Univ Fukui, Fac Engn, Fukui 9108507, Japan
来源
APPLIED SCIENCES-BASEL | 2019年 / 9卷 / 05期
关键词
side channel attack; re-keying; tweakable block cipher; provable security;
D O I
10.3390/app9051002
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The re-keying scheme is a variant of the symmetric encryption scheme where a sender (respectively, receiver) encrypts (respectively, decrypts) plaintext with a temporal session key derived from a master secret key and publicly-shared randomness. It is one of the system-level countermeasures against the side channel attacks (SCAs), which make attackers unable to collect enough power consumption traces for their analyses by updating the randomness (i.e., session key) frequently. In 2015, Dobraunig et al. proposed two kinds of re-keying schemes. The first one is a scheme without the beyond birthday security, which fixes the security vulnerability of the previous re-keying scheme of Medwed et al. Their second scheme is an abstract scheme with the beyond birthday security, which, as a black-box, consists of two functions; a re-keying function to generate a session key and a tweakable block cipher to encrypt plaintext. They assumed that the tweakable block cipher was ideal (namely, secure against the related key, chosen plaintext, and chosen ciphertext attacks) and proved the security of their scheme as a secure tweakable block cipher. In this paper, we revisit the re-keying scheme. The previous works did not discuss security in considering the SCA well. They just considered that the re-keying scheme was SCA resistant when the temporal session key was always refreshed with randomness. In this paper, we point out that such a discussion is insufficient by showing a concrete attack. We then introduce the definition of an SCA-resistant re-keying scheme, which captures the security against such an attack. We also give concrete schemes and discuss their security and applications.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Efficient re-keying scheme for group key distribution
    Jiang, Yixin
    Shi, Minghui
    Shen, Xuemin
    Lin, Chuang
    WCNC 2008: IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-7, 2008, : 2639 - +
  • [2] A secure re-keying scheme with key recovery property
    Kurnio, H
    Safavi-Naini, R
    Wang, HX
    INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 40 - 55
  • [3] Increasing the lifetime of a key: A comparative analysis of the security of re-keying techniques
    Abdalla, M
    Bellare, M
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 546 - 559
  • [4] Security Analysis of Deterministic Re-keying with Masking and Shuffling: Application to ISAP
    Udvarhelyi, Balazs
    Bronchain, Olivier
    Standaert, Francois-Xavier
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2021, 2021, 12910 : 168 - 183
  • [5] An efficient re-keying scheme for cluster based wireless sensor networks
    Khan, Faraz Idris
    Jameel, Hassan
    Raazi, S. M. K.
    Khan, Adil Mehmood
    Huh, Eui Nam
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 2, PROCEEDINGS, 2007, 4706 : 1028 - 1037
  • [6] Scheme of re-keying management in real-time distributed group communication
    Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Harbin 150001, China
    Harbin Gongye Daxue Xuebao, 2008, 1 (73-76+135):
  • [7] A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security
    Abdullah, Maan Younis
    Hua, Gui Wei
    Alsharabi, Naif
    SENSORS, 2008, 8 (12) : 7866 - 7881
  • [8] Efficient re-keying protocols for multicast encryption
    Di Crescenzo, G
    Kornievskaia, O
    SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 119 - 132
  • [9] Scalable security in Wireless Sensor and Actuator Networks (WSANs): integration re-keying with routing
    Hu, Fei
    Siddiqui, Waqaas
    Sankar, Krishna
    COMPUTER NETWORKS, 2007, 51 (01) : 285 - 308
  • [10] TARE: Topology Adaptive Re-kEying scheme for secure group communication in IoT networks
    Anshul Anand
    Mauro Conti
    Pallavi Kaliyar
    Chhagan Lal
    Wireless Networks, 2020, 26 : 2449 - 2463