Cryptographic Adversary Model: Timing and Power Attacks

  • Mat Isa M
  • Hashim H
  • Abd Ghafar A
  • et al.
N/ACitations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this work, we present an adversary model that incorporates side chan- nel attacks in the Indistinguishability Experiment for Adaptive Chosen Ciphertext Attack (CCA2).We propose security assumptions and an attack model for a secure SSW-ARQ protocol with an integration of TFTP protocol. We also present the security reduction of SSW-ARQ protocol from Cramer-Shoup encryption scheme, timing and power attacks as side channel security for the SSW-ARQ protocol. We suggest using a lightweight symmetric encryption for data encryption and asymmet- ric encryption for key exchange protocols in the TFTP. The target implementation of secure TFTP is for embedded devices such as Wi-Fi Access Points (AP) and remote Base Stations (BS). In this paper we present the security proofs based on an attack model (IND-CCA2) for securing TFTP protocol. We have also introduce a novel adversary model in IND-CCA2-(TA, PA, TPA) and it is considered a practical model because the model incorporates the timing attack and power attack.

Cite

CITATION STYLE

APA

Mat Isa, M. A., Hashim, H., Abd Ghafar, A. H., Ab Manan, J., Syed Adnan, S. F., & Mahmod, R. (2015). Cryptographic Adversary Model: Timing and Power Attacks. In Transactions on Engineering Technologies (pp. 585–598). Springer Netherlands. https://doi.org/10.1007/978-94-017-9804-4_41

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free