In this work, we present an adversary model that incorporates side chan- nel attacks in the Indistinguishability Experiment for Adaptive Chosen Ciphertext Attack (CCA2).We propose security assumptions and an attack model for a secure SSW-ARQ protocol with an integration of TFTP protocol. We also present the security reduction of SSW-ARQ protocol from Cramer-Shoup encryption scheme, timing and power attacks as side channel security for the SSW-ARQ protocol. We suggest using a lightweight symmetric encryption for data encryption and asymmet- ric encryption for key exchange protocols in the TFTP. The target implementation of secure TFTP is for embedded devices such as Wi-Fi Access Points (AP) and remote Base Stations (BS). In this paper we present the security proofs based on an attack model (IND-CCA2) for securing TFTP protocol. We have also introduce a novel adversary model in IND-CCA2-(TA, PA, TPA) and it is considered a practical model because the model incorporates the timing attack and power attack.
CITATION STYLE
Mat Isa, M. A., Hashim, H., Abd Ghafar, A. H., Ab Manan, J., Syed Adnan, S. F., & Mahmod, R. (2015). Cryptographic Adversary Model: Timing and Power Attacks. In Transactions on Engineering Technologies (pp. 585–598). Springer Netherlands. https://doi.org/10.1007/978-94-017-9804-4_41
Mendeley helps you to discover research relevant for your work.