2010
DOI: 10.1007/978-3-642-12678-9_17
|View full text |Cite
|
Sign up to set email alerts
|

Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices

Abstract: The market for RFID technology has grown rapidly over the past few years. Going along with the proliferation of RFID technology is an increasing demand for secure and privacy-preserving applications. In this context, RFID tags need to be protected against physical attacks such as Differential Power Analysis (DPA) and fault attacks. The main obstacles towards secure RFID are the extreme constraints of passive tags in terms of power consumption and silicon area, which makes the integration of countermeasures aga… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
101
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 102 publications
(107 citation statements)
references
References 29 publications
1
101
0
Order By: Relevance
“…We approach the topic with a detailed analysis of the security of fresh re-keying [33,39] as a promising mechanism to prevent DPA on memory encryption. While re-keying completely thwarts DPA on the cryptographic key, our major result here is that re-keying provides merely first-order DPA security for the memory content itself.…”
Section: Contributionmentioning
confidence: 99%
See 2 more Smart Citations
“…We approach the topic with a detailed analysis of the security of fresh re-keying [33,39] as a promising mechanism to prevent DPA on memory encryption. While re-keying completely thwarts DPA on the cryptographic key, our major result here is that re-keying provides merely first-order DPA security for the memory content itself.…”
Section: Contributionmentioning
confidence: 99%
“…Therefore, frequent rekeying [33,39] tries to limit the number of different processed inputs per key, i.e., the data complexity.…”
Section: Frequent Re-keyingmentioning
confidence: 99%
See 1 more Smart Citation
“…Whereas the scheme is efficient for long messages, the initialization effort might render it impractical for smartcard and RFID applications. More recently, a fresh rekeying scheme was presented at Africacrypt 2010 [19]. It combines the re-keying used in leakage-resilient cryptography with easy to protect low-cost mappings in order to remove the initialization overhead.…”
Section: Introductionmentioning
confidence: 99%
“…It essentially encrypts every message block m under a fresh session key k * , with a block cipher. The session key is generated from the master key k and a public random nonce r, with a function g. At first sight, it may seem that one just shifts the problem of protecting the block cipher f against physical attacks to the one of protecting the function g. Interestingly, it is argued in [19] that a proper selection of g may lead this scheme to be significantly easier to protect against such attacks than the underlying block cipher f . Namely, g does not need to be cryptographically strong.…”
Section: Introductionmentioning
confidence: 99%