DocumentCode :
678219
Title :
Timing filter for counter mode encryption
Author :
Ahmed, Nova
Author_Institution :
Danmarks Tekniske Univ. - DTU, Copenhagen, Denmark
fYear :
2013
fDate :
11-12 Dec. 2013
Firstpage :
107
Lastpage :
111
Abstract :
An encryption scheme, such as counter (CTR) mode encryption, uses a block cipher to achieve the confidentiality of plaintext. Assuming the block cipher to be a pseudorandom function (PRF), CTR mode encryption is provably secure, namely it achieves indistinguishability under chosen plaintext attacks (IND-CPA). The CTR mode, however, is not specifically designed to hide timing patterns present in the plaintext generation process. Thus, a direct implementation of the CTR mode may leak these timing patterns in the ciphertext, which can be used to cryptanalyse the encryption system. In this paper we propose a timing filter for the CTR mode, which is specifically designed to hide such timing patterns in the ciphertext. We prove that the timing filter is secure in the sense of IND-CPA. Our timing filter poses a negligible overhead on the channel throughput.
Keywords :
cryptography; CTR; IND-CPA; PRF; block cipher; ciphertext; counter mode encryption; plaintext attacks; plaintext confidentiality; pseudorandom function; timing filter; timing patterns; Ciphers; Encryption; Games; Radiation detectors; Timing; Cryptanalysis; Cryptography; Encryption; Hardware Security; Network Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Assurance (NCIA), 2013 2nd National Conference on
Conference_Location :
Rawalpindi
Print_ISBN :
978-1-4799-1287-2
Type :
conf
DOI :
10.1109/NCIA.2013.6725333
Filename :
6725333
Link To Document :
بازگشت