Review on Leakage Resilient Key Exchange Security Model

Authors

  • Zheng Wei Clement Chan Faculty of Computer Science and Information Technology, University Tun Hussein Onn Malaysia, Malaysia
  • Chai Wen Chuah Faculty of Computer Science and Information Technology, University Tun Hussein Onn Malaysia, Malaysia
  • Janaka Alawatugoda Department of Computer Engineering, Faculty of Engineering, University of Peradeniya, Peradeniya, Sri Lanka

DOI:

https://doi.org/10.17762/ijcnis.v11i1.3790

Abstract

In leakage resilient cryptography, leakage resilient key exchange protocols are constructed to defend against leakage attacks. Then, the key exchange protocol is proved with leakage resilient security model to determine whether its security proof can provide the security properties it claimed or to find out any unexamined flaw during protocol building. It is an interesting work to review the meaningful security properties provided by these security models. This work review how a leakage resilient security model for a key exchange protocol has been evolved over years according to the increasing security requirement which covers a different range of attacks. The relationship on how an adversary capability in the leakage resilient security model can be related to real-world attack scenarios is studied. The analysis work for each leakage resilient security model here enables a better knowledge on how an adversary query addresses different leakage attacks setting, thereby understand the motive of design for a cryptographic primitive in the security model.

Downloads

Published

2019-04-19 — Updated on 2022-04-17

Versions

How to Cite

Clement Chan, Z. W., Chuah, C. W., & Alawatugoda, J. (2022). Review on Leakage Resilient Key Exchange Security Model. International Journal of Communication Networks and Information Security (IJCNIS), 11(1). https://doi.org/10.17762/ijcnis.v11i1.3790 (Original work published April 19, 2019)

Issue

Section

Surveys / Reviews