A robust security framework with bit-flipping attack and timing attack for key derivation functions
A Key Derivation Function (KDF) derives cryptographic keys from private string and public information. The security property for the cryptographic keys is indistinguishable from the random strings of equal length. The security analysis of KDFs has received increasing attention. The practice importan...
Saved in:
Main Authors: | , |
---|---|
格式: | Article |
語言: | English |
出版: |
Institution of Engineering and Technology (IET) / Wiley Open Access
2020
|
主題: | |
在線閱讀: | http://eprints.uthm.edu.my/6534/1/AJ%202020%20%28331%29.pdf http://eprints.uthm.edu.my/6534/ https://doi.org/10.1049/iet-ifs.2019.0163 |
標簽: |
添加標簽
沒有標簽, 成為第一個標記此記錄!
|
總結: | A Key Derivation Function (KDF) derives cryptographic keys from private string and public information. The security property for the cryptographic keys is indistinguishable from the random strings of equal length. The security analysis of KDFs has received increasing attention. The practice important of KDFs are reflected in the adoption of industry standards such as NIST800-135 and PKCS5. This paper proposes a robust security framework which takes into consideration the side channel attacks. The robust security framework consists of the proposed security model and existing security models. The proposed security model is known as Adaptive Chosen All Inputs Model (CAM) which analyses the security of KDFs in terms of the bit-flipping attack and timing attack. The existing security model is the Adaptive Chosen Public Inputs Model (CPM). This research shows the implication relationship and non-implication relationship between CAM and CPM. The simulation of security models is according to the indistinguishable game played between a challenger and an adversary. These security models are used to evaluate existing KDFs. The result shows that none of the existing KDFs are secure in CAM for both the bit-flipping attack and timing attack. Hence, this research introduces an alternative KDF that is proven secure in CAM. |
---|