Re-Keying Scheme Revisited: Security Model and Instantiations

被引:4
|
作者
Komano, Yuichi [1 ]
Hirose, Shoichi [2 ]
机构
[1] Toshiba Co Ltd, Kawasaki, Kanagawa 2128582, Japan
[2] Univ Fukui, Fac Engn, Fukui 9108507, Japan
来源
APPLIED SCIENCES-BASEL | 2019年 / 9卷 / 05期
关键词
side channel attack; re-keying; tweakable block cipher; provable security;
D O I
10.3390/app9051002
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The re-keying scheme is a variant of the symmetric encryption scheme where a sender (respectively, receiver) encrypts (respectively, decrypts) plaintext with a temporal session key derived from a master secret key and publicly-shared randomness. It is one of the system-level countermeasures against the side channel attacks (SCAs), which make attackers unable to collect enough power consumption traces for their analyses by updating the randomness (i.e., session key) frequently. In 2015, Dobraunig et al. proposed two kinds of re-keying schemes. The first one is a scheme without the beyond birthday security, which fixes the security vulnerability of the previous re-keying scheme of Medwed et al. Their second scheme is an abstract scheme with the beyond birthday security, which, as a black-box, consists of two functions; a re-keying function to generate a session key and a tweakable block cipher to encrypt plaintext. They assumed that the tweakable block cipher was ideal (namely, secure against the related key, chosen plaintext, and chosen ciphertext attacks) and proved the security of their scheme as a secure tweakable block cipher. In this paper, we revisit the re-keying scheme. The previous works did not discuss security in considering the SCA well. They just considered that the re-keying scheme was SCA resistant when the temporal session key was always refreshed with randomness. In this paper, we point out that such a discussion is insufficient by showing a concrete attack. We then introduce the definition of an SCA-resistant re-keying scheme, which captures the security against such an attack. We also give concrete schemes and discuss their security and applications.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] Re-Keying Mechanism for TinySec using ECC and Hash Chains
    Iqbal, Ummer
    Intikhab, Sana
    2017 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2017,
  • [22] A novel conference key distribution system with re-keying protocol
    Huang, HF
    Chang, CC
    WEB AND COMMUNICATION TECHNOLOGIES AND INTERNET -RELATED SOCIAL ISSUES - HSI 2005, 2005, 3597 : 282 - 290
  • [23] Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
    Medwed, Marcel
    Standaert, Francois-Xavier
    Grossschaedl, Johann
    Regazzoni, Francesco
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 279 - +
  • [24] Side-Channel Analysis for the Re-Keying Protocol of Bluetooth Low Energy
    Pei Cao
    Chi Zhang
    Xiang-Jun Lu
    Hai-Ning Lu
    Da-Wu Gu
    Journal of Computer Science and Technology, 2023, 38 : 1132 - 1148
  • [25] Re-keying analysis in group key management of wireless sensor networks
    Kumari, Prity
    Singh, Karam Ratan
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2024, 16 (03): : 665 - 677
  • [26] Re-keying analysis in group key management of wireless sensor networks
    Prity Kumari
    Karam Ratan Singh
    Cryptography and Communications, 2024, 16 : 665 - 677
  • [27] RCB: leakage-resilient authenticated encryption via re-keying
    Megha Agrawal
    Tarun Kumar Bansal
    Donghoon Chang
    Amit Kumar Chauhan
    Seokhie Hong
    Jinkeon Kang
    Somitra Kumar Sanadhya
    The Journal of Supercomputing, 2018, 74 : 4173 - 4198
  • [28] Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems
    Dziembowski, Stefan
    Faust, Sebastian
    Herold, Gottfried
    Journault, Anthony
    Masny, Daniel
    Standaert, Francois-Xavier
    ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 : 272 - 301
  • [29] Stacking Ensemble Algorithm to Predict Re-keying in Group Key Management
    Kumari, Prity
    Singh, Karam Ratan
    Kumar, Ranjan
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2025,
  • [30] RCB: leakage-resilient authenticated encryption via re-keying
    Agrawal, Megha
    Bansal, Tarun Kumar
    Chang, Donghoon
    Chauhan, Amit Kumar
    Hong, Seokhie
    Kang, Jinkeon
    Sanadhya, Somitra Kumar
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (09): : 4173 - 4198