In this chapter, we present a series of secret keys distribution in a key exchange protocol that incorporates protection against side channel attacks using Indistinguishability Experiment (modified) for Adaptive Chosen Ciphertext Attack (CCA2). We also present a security analysis and a new attack model for a secure Chain Key Exchange Protocol with an integration of TFTP protocol in the UBOOT firmware. To enable RasberberryPi “system on chip” (SoC) to perform cryptographic computation, we modified the GNU GMP Bignum library to support a simple primitive cryptographic computation in the UBOOT firmware.We suggest using our key exchange protocol for a secure key distribution in the UBOOT’s TFTP protocol. Latter, the TFTP protocol can use the secure key which has been distributed by our key exchange protocol to encrypt the TFTP’s data using another symmetric encryption scheme such as AES256. Lastly, we introduce a variance of adversary model in IND-CCA2-(TA, PA, TPA) which may be considered as a more realistic and practical model because it incorporates timing attack and power attack.
CITATION STYLE
Mat Isa, M. A., Hashim, H., Ab Manan, J., Syed Adnan, S. F., & Mahmod, R. (2015). A Series of Secret Keys in a Key Distribution Protocol. In Transactions on Engineering Technologies (pp. 615–628). Springer Netherlands. https://doi.org/10.1007/978-94-017-9804-4_43
Mendeley helps you to discover research relevant for your work.