Crynodeb
The security guarantees of cryptographic primitives are subject to the assumption that established keys are known only by the legitimate users and no information about the key bits is known by illegitimate users. Unfortunately, this assumption may not be applicable in leakage-prone key establishment schemes. Namely, information leakage about an established key (defined as a bit inference rate of an adversary that is strictly greater than 50%) reduces its computational effort required in an exhaustive key search. In this paper, we present a methodology and a polynomial-time algorithm that determines the exact impact of information leakage on a generated bit sequence and expressed these findings in terms of the achieved level of bit security. Additional simulation results enable us to determine the achieved level of bit security of a leakage-prone bit sequence or, conversely, enable us to determine the length of a bit sequence necessary to achieve a selected level of bit security.
Iaith wreiddiol | Saesneg |
---|---|
Rhif yr erthygl | 10124043 |
Tudalennau (o-i) | 1694-1698 |
Nifer y tudalennau | 5 |
Cyfnodolyn | IEEE Communications Letters |
Cyfrol | 27 |
Rhif cyhoeddi | 7 |
Dyddiad ar-lein cynnar | 12 Mai 2023 |
Dynodwyr Gwrthrych Digidol (DOIs) | |
Statws | Cyhoeddwyd - 1 Gorff 2023 |