Re-Keying Scheme Revisited: Security Model and Instantiations

被引:4
|
作者
Komano, Yuichi [1 ]
Hirose, Shoichi [2 ]
机构
[1] Toshiba Co Ltd, Kawasaki, Kanagawa 2128582, Japan
[2] Univ Fukui, Fac Engn, Fukui 9108507, Japan
来源
APPLIED SCIENCES-BASEL | 2019年 / 9卷 / 05期
关键词
side channel attack; re-keying; tweakable block cipher; provable security;
D O I
10.3390/app9051002
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The re-keying scheme is a variant of the symmetric encryption scheme where a sender (respectively, receiver) encrypts (respectively, decrypts) plaintext with a temporal session key derived from a master secret key and publicly-shared randomness. It is one of the system-level countermeasures against the side channel attacks (SCAs), which make attackers unable to collect enough power consumption traces for their analyses by updating the randomness (i.e., session key) frequently. In 2015, Dobraunig et al. proposed two kinds of re-keying schemes. The first one is a scheme without the beyond birthday security, which fixes the security vulnerability of the previous re-keying scheme of Medwed et al. Their second scheme is an abstract scheme with the beyond birthday security, which, as a black-box, consists of two functions; a re-keying function to generate a session key and a tweakable block cipher to encrypt plaintext. They assumed that the tweakable block cipher was ideal (namely, secure against the related key, chosen plaintext, and chosen ciphertext attacks) and proved the security of their scheme as a secure tweakable block cipher. In this paper, we revisit the re-keying scheme. The previous works did not discuss security in considering the SCA well. They just considered that the re-keying scheme was SCA resistant when the temporal session key was always refreshed with randomness. In this paper, we point out that such a discussion is insufficient by showing a concrete attack. We then introduce the definition of an SCA-resistant re-keying scheme, which captures the security against such an attack. We also give concrete schemes and discuss their security and applications.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis
    Belaid, Sonia
    De Santis, Fabrizio
    Heyszl, Johann
    Mangard, Stefan
    Medwed, Marcel
    Schmidt, Jorn-Marc
    Standaert, Francois-Xavier
    Tillich, Stefan
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2014, 4 (03) : 157 - 171
  • [42] Provably secure counter mode with related-key-based internal re-keying
    Alekseev, Evgeny K.
    Goncharenko, Kirill S.
    Marshalko, Grigory B.
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2020, 16 (04) : 285 - 294
  • [43] Re-keying solution for secure multicast using shared key tree among multicast sessions in same group
    National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    不详
    Wuhan Ligong Daxue Xuebao/Journal of Wuhan University of Technology, 2008, 30 (12): : 98 - 102
  • [44] Practical construction for multicast re-keying schemes using R-S code and A-G code
    Bai, Chun-Yan
    Houston, Roberta
    Feng, Gui-Liang
    Informatica (Ljubljana), 2003, 27 (01) : 39 - 47
  • [45] Exploring crypto-physical dark matter and learning with physical rounding towards secure and efficient fresh re-keying
    Duval S.
    Méaux P.
    Momin C.
    Standaert F.-X.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2021 (01): : 373 - 401
  • [46] DS-HOFKCT: A multicast re-keying protocol based on Huffman one-way function key chain tree
    Sun, D
    Huang, TS
    Sun, FO
    2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 1132 - 1135
  • [47] Identity-based encryption with security against the KGC: A formal model and its instantiations
    Emura, Keita
    Katsumata, Shuichi
    Watanabe, Yohei
    THEORETICAL COMPUTER SCIENCE, 2022, 900 : 97 - 119
  • [48] Re-make / Re-model revisited
    Schumacher, Eckhard
    TEXT & KRITIK, 2021, (231): : 27 - 37
  • [49] Security Model and Analysis of FHMQV, Revisited
    Liu, Shengli
    Sakurai, Kouichi
    Weng, Jian
    Zhang, Fangguo
    Zhao, Yunlei
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2013, 2014, 8567 : 255 - 269
  • [50] On the Security of a Designated-Verifier Proxy Signature Scheme and Its Improved Scheme (revisited)
    Zhang, Jianhong
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2196 - 2199