Wen Koh, Wen and Wen Chuah, Chai (2020) A robust security framework with bit-flipping attack and timing attack for key derivation functions. IET Information Security, 14 (5). pp. 562-571. ISSN 1751-8709
Text
AJ 2020 (331).pdf Restricted to Registered users only Download (1MB) | Request a copy |
Abstract
A Key Derivation Function (KDF) derives cryptographic keys from private string and public information. The security property for the cryptographic keys is indistinguishable from the random strings of equal length. The security analysis of KDFs has received increasing attention. The practice important of KDFs are reflected in the adoption of industry standards such as NIST800-135 and PKCS5. This paper proposes a robust security framework which takes into consideration the side channel attacks. The robust security framework consists of the proposed security model and existing security models. The proposed security model is known as Adaptive Chosen All Inputs Model (CAM) which analyses the security of KDFs in terms of the bit-flipping attack and timing attack. The existing security model is the Adaptive Chosen Public Inputs Model (CPM). This research shows the implication relationship and non-implication relationship between CAM and CPM. The simulation of security models is according to the indistinguishable game played between a challenger and an adversary. These security models are used to evaluate existing KDFs. The result shows that none of the existing KDFs are secure in CAM for both the bit-flipping attack and timing attack. Hence, this research introduces an alternative KDF that is proven secure in CAM.
Item Type: | Article |
---|---|
Subjects: | T Technology > T Technology (General) > T175-178 Industrial research. Research and development |
Divisions: | Faculty of Computer Science and Information Technology > Department of Information Security |
Depositing User: | Mr. Shahrul Ahmad Bakri |
Date Deposited: | 28 Feb 2022 06:51 |
Last Modified: | 28 Feb 2022 06:51 |
URI: | http://eprints.uthm.edu.my/id/eprint/6534 |
Actions (login required)
View Item |