Re-Keying Scheme Revisited: Security Model and Instantiations

被引:4
|
作者
Komano, Yuichi [1 ]
Hirose, Shoichi [2 ]
机构
[1] Toshiba Co Ltd, Kawasaki, Kanagawa 2128582, Japan
[2] Univ Fukui, Fac Engn, Fukui 9108507, Japan
来源
APPLIED SCIENCES-BASEL | 2019年 / 9卷 / 05期
关键词
side channel attack; re-keying; tweakable block cipher; provable security;
D O I
10.3390/app9051002
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The re-keying scheme is a variant of the symmetric encryption scheme where a sender (respectively, receiver) encrypts (respectively, decrypts) plaintext with a temporal session key derived from a master secret key and publicly-shared randomness. It is one of the system-level countermeasures against the side channel attacks (SCAs), which make attackers unable to collect enough power consumption traces for their analyses by updating the randomness (i.e., session key) frequently. In 2015, Dobraunig et al. proposed two kinds of re-keying schemes. The first one is a scheme without the beyond birthday security, which fixes the security vulnerability of the previous re-keying scheme of Medwed et al. Their second scheme is an abstract scheme with the beyond birthday security, which, as a black-box, consists of two functions; a re-keying function to generate a session key and a tweakable block cipher to encrypt plaintext. They assumed that the tweakable block cipher was ideal (namely, secure against the related key, chosen plaintext, and chosen ciphertext attacks) and proved the security of their scheme as a secure tweakable block cipher. In this paper, we revisit the re-keying scheme. The previous works did not discuss security in considering the SCA well. They just considered that the re-keying scheme was SCA resistant when the temporal session key was always refreshed with randomness. In this paper, we point out that such a discussion is insufficient by showing a concrete attack. We then introduce the definition of an SCA-resistant re-keying scheme, which captures the security against such an attack. We also give concrete schemes and discuss their security and applications.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] Side-Channel Analysis for the Re-Keying Protocol of Bluetooth Low Energy
    Cao, Pei
    Zhang, Chi
    Lu, Xiang-Jun
    Lu, Hai-Ning
    Gu, Da-Wu
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2023, 38 (05) : 1132 - 1148
  • [32] A proposal and its evaluations of a re-keying system for dynamic secure group communications
    Information Technology R and D Center, Mitsubishi Electric Corporation, Kamakura, 247-8501, Japan
    不详
    不详
    不详
    不详
    不详
    不详
    不详
    Syst Comput Jpn, 2006, 2 (11-24):
  • [33] A proposal and its evaluations of a Re-keying method for dynamic secure group communications
    Park, M
    Okazaki, N
    Seno, S
    Kashima, K
    Oshima, K
    18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 43 - 48
  • [34] Attacking the IETF/ISO Standard for Internal Re-keying CTR-ACPKM
    Dunkelman, Orr
    Ghosh, Shibam
    Lambooij, Eran
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2023, 2023 (01) : 41 - 66
  • [35] A new birthday-type algorithm for attacking the fresh re-keying countermeasure
    Guo, Qian
    Johansson, Thomas
    INFORMATION PROCESSING LETTERS, 2019, 146 : 30 - 34
  • [36] Protecting Block Ciphers against Differential Fault Attacks without Re-keying
    Baksi, Anuhhah
    Bhasin, Shivam
    Breier, Jakub
    Khairallah, Mustafa
    Peyrin, Thomas
    PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2018, : 191 - 194
  • [37] Optimized re-keying solution for secure multicast using PRF and XOR operation
    State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    Beijing Youdian Daxue Xuebao, 2008, 1 (92-96): : 92 - 96
  • [38] A new group re-keying protocol with smaller computational and key storage overh
    Nemaney Pour, Alireza
    Kumekawa, Kazuya
    Kato, Toshihiko
    Itoh, Shuichi
    PROCEEDINGS OF THE FIFTH IASTED INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS, 2006, : 165 - +
  • [39] A hybrid re-keying mechanism for supporting secure multicast of multimedia data over the Internet
    Pang, IYK
    Chan, HCB
    2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 3110 - 3115
  • [40] Provably secure counter mode with related-key-based internal re-keying
    Evgeny K. Alekseev
    Kirill S. Goncharenko
    Grigory B. Marshalko
    Journal of Computer Virology and Hacking Techniques, 2020, 16 : 285 - 294