Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Re-Keying Scheme Revisited: Security Model and Instantiations

View through CrossRef
The re-keying scheme is a variant of the symmetric encryption scheme where a sender (respectively, receiver) encrypts (respectively, decrypts) plaintext with a temporal session key derived from a master secret key and publicly-shared randomness. It is one of the system-level countermeasures against the side channel attacks (SCAs), which make attackers unable to collect enough power consumption traces for their analyses by updating the randomness (i.e., session key) frequently. In 2015, Dobraunig et al. proposed two kinds of re-keying schemes. The first one is a scheme without the beyond birthday security, which fixes the security vulnerability of the previous re-keying scheme of Medwed et al. Their second scheme is an abstract scheme with the beyond birthday security, which, as a black-box, consists of two functions; a re-keying function to generate a session key and a tweakable block cipher to encrypt plaintext. They assumed that the tweakable block cipher was ideal (namely, secure against the related key, chosen plaintext, and chosen ciphertext attacks) and proved the security of their scheme as a secure tweakable block cipher. In this paper, we revisit the re-keying scheme. The previous works did not discuss security in considering the SCA well. They just considered that the re-keying scheme was SCA resistant when the temporal session key was always refreshed with randomness. In this paper, we point out that such a discussion is insufficient by showing a concrete attack. We then introduce the definition of an SCA-resistant re-keying scheme, which captures the security against such an attack. We also give concrete schemes and discuss their security and applications.
Title: Re-Keying Scheme Revisited: Security Model and Instantiations
Description:
The re-keying scheme is a variant of the symmetric encryption scheme where a sender (respectively, receiver) encrypts (respectively, decrypts) plaintext with a temporal session key derived from a master secret key and publicly-shared randomness.
It is one of the system-level countermeasures against the side channel attacks (SCAs), which make attackers unable to collect enough power consumption traces for their analyses by updating the randomness (i.
e.
, session key) frequently.
In 2015, Dobraunig et al.
proposed two kinds of re-keying schemes.
The first one is a scheme without the beyond birthday security, which fixes the security vulnerability of the previous re-keying scheme of Medwed et al.
Their second scheme is an abstract scheme with the beyond birthday security, which, as a black-box, consists of two functions; a re-keying function to generate a session key and a tweakable block cipher to encrypt plaintext.
They assumed that the tweakable block cipher was ideal (namely, secure against the related key, chosen plaintext, and chosen ciphertext attacks) and proved the security of their scheme as a secure tweakable block cipher.
In this paper, we revisit the re-keying scheme.
The previous works did not discuss security in considering the SCA well.
They just considered that the re-keying scheme was SCA resistant when the temporal session key was always refreshed with randomness.
In this paper, we point out that such a discussion is insufficient by showing a concrete attack.
We then introduce the definition of an SCA-resistant re-keying scheme, which captures the security against such an attack.
We also give concrete schemes and discuss their security and applications.

Related Results

Development Tasks of AI-based Security Industry
Development Tasks of AI-based Security Industry
Recently, the government's interest in industries utilizing AI has been amplified, with initiatives such as announcing a roadmap aiming to achieve the goal of becoming the world's ...
Human Security
Human Security
The term “human security” was first employed in the United Nations Development Programme (UNDP) Human Development Report (HDR) of 1994, which argued for a “people-centric” concept ...
Personnel Security as an Integral Part of Economic Security at Agricultural Enterprises
Personnel Security as an Integral Part of Economic Security at Agricultural Enterprises
Abstract. Introduction. The article examines the place of personnel security as a component of the system of economic security at enterprises. The main approaches to the formation ...
ESSENTIAL SECURITY PRACTICES FOR FORTIFYING MOBILE APPS
ESSENTIAL SECURITY PRACTICES FOR FORTIFYING MOBILE APPS
“Essential Security Practices for Fortifying Mobile Apps” is a definitive guide designed to empower developers, security professionals, and organizations with the knowledge and too...
Cybersecurity and Organisational Performance – the Interplay
Cybersecurity and Organisational Performance – the Interplay
The interplay between cybersecurity and organisational performance is multifaceted in nature, as it is related to how cybersecurity impacts and is impacted by various organisationa...
Design of Turbo Trellis Coding Modulation Scheme of Rate 4/9 for Rician Fading Channel
Design of Turbo Trellis Coding Modulation Scheme of Rate 4/9 for Rician Fading Channel
When the fading channels are encountered during data communication, errors are likely to occur at the receiving end due to multipath propagation. Researchers have been consistently...
TOOLS OF ECONOMIC DIPLOMACY IN ENSURING FOOD SECURITY
TOOLS OF ECONOMIC DIPLOMACY IN ENSURING FOOD SECURITY
Purpose. The aim of the article is to study the role of tools of economic diplomacy in ensuring food security, identification of effective measures that contribute to the stability...
Public budget security administration: development of primary mechanisms
Public budget security administration: development of primary mechanisms
The current state of public administration of budget security indicates its actual absence. With the extremely important role of budget security, both in the life of the country as...

Back to Top