Secret Key Distribution Protocols Based on Self-Powered Timekeeping Devices

04/09/2021
by   Mustafizur Rahman, et al.
0

In this paper, we present novel secret key distribution protocols using low-cost, hardware chipsets containing millions of synchronized self-powered timers. The secret keys are derived based on the timers' physical dynamic responses which provide security against any potential side-channel attacks, malicious tampering, or snooping. Using the behavioral model of the self-powered timers, we first show that the key-strings derived from the timers can pass the randomness test as defined by the National Institute of Standards and Technology (NIST) suite. The key-strings are then used in two key exchange protocols which exploit elapsed time as one-way functions. The protocols proposed in this paper facilitate secure communication between (a) a user and a remote Server; and (b) two users. Using Monte-Carlo simulations, we investigate the scalability and the security of these protocols against different adversarial attacks. We also investigate the robustness of these protocols in the presence of real-world operating conditions and we investigate the use of error-correcting codes to mitigate noise-related artifacts.

READ FULL TEXT

page 1

page 3

research
06/16/2019

A Comprehensive Formal Security Analysis and Revision of the Two-phase Key Exchange Primitive of TPM 2.0

The Trusted Platform Module (TPM) version 2.0, which has been demonstrat...
research
05/02/2018

Group Secret-Key Generation using Algebraic Rings in Three-User Wireless Networks

Physical-layer Group Secret-Key (GSK) generation is an effective way of ...
research
02/15/2023

Quantum key distribution with post-processing driven by physical unclonable functions

Quantum key-distribution protocols allow two honest distant parties to e...
research
06/26/2020

WARDEN: Warranting Robustness Against Deception in Next-Generation Systems

Malicious users of a data center can reverse engineer power-management f...
research
07/28/2023

Provably secure KEM-based protocols over unauthenticated channels

In this paper we propose a number of KEM-based protocols to establish a ...
research
08/14/2016

Security and Performance Comparison of Different Secure Channel Protocols for Avionics Wireless Networks

The notion of Integrated Modular Avionics (IMA) refers to inter-connecte...
research
06/02/2021

MOBS (Matrices Over Bit Strings) public key exchange

We use matrices over bit strings as platforms for Diffie-Hellman-like pu...

Please sign up or login with your details

Forgot password? Click here to reset