Creating and sharing knowledge for telecommunications

Bit Security Estimation for Leakage-Prone Key Establishment Schemes

de Ree, M. J. M. ; Mantas, G. ; Rodriguez, J.

IEEE Communications Letters Vol. 27, Nº 7, pp. 1694 - 1698, May, 2023.

ISSN (print): 1089-7798
ISSN (online):

Scimago Journal Ranking: 1,80 (in 2022)

Digital Object Identifier: 10.1109/LCOMM.2023.3275647

Download Full text PDF ( 1 MB)

Downloaded 3 times

The security guarantees of cryptographic primitives are subject to the assumption that established keys are known only by the legitimate users and no information about the key bits is known by illegitimate users. Unfortunately, this assumption may not be applicable in leakage-prone key establishment schemes. Namely, information leakage about an established key (defined as a bit inference rate of an adversary that is strictly greater than 50%) reduces its computational effort required in an exhaustive key search. In this paper, we present a methodology and a polynomial-time algorithm that determines the exact impact of information leakage on a generated bit sequence and expressed these findings in terms of the achieved level of bit security. Additional simulation results enable us to determine the achieved level of bit security of a leakage-prone bit sequence or, conversely, enable us to determine the length of a bit sequence necessary to achieve a selected level of bit security.