Cargando…

A Comprehensive Study of the Key Enumeration Problem

In this paper, we will study the key enumeration problem, which is connected to the key recovery problem posed in the cold boot attack setting. In this setting, an attacker with physical access to a computer may obtain noisy data of a cryptographic secret key of a cryptographic scheme from main memo...

Descripción completa

Detalles Bibliográficos
Autor principal: Villanueva-Polanco, Ricardo
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7514303/
http://dx.doi.org/10.3390/e21100972
_version_ 1783586556957687808
author Villanueva-Polanco, Ricardo
author_facet Villanueva-Polanco, Ricardo
author_sort Villanueva-Polanco, Ricardo
collection PubMed
description In this paper, we will study the key enumeration problem, which is connected to the key recovery problem posed in the cold boot attack setting. In this setting, an attacker with physical access to a computer may obtain noisy data of a cryptographic secret key of a cryptographic scheme from main memory via this data remanence attack. Therefore, the attacker would need a key-recovery algorithm to reconstruct the secret key from its noisy version. We will first describe this attack setting and then pose the problem of key recovery in a general way and establish a connection between the key recovery problem and the key enumeration problem. The latter problem has already been studied in the side-channel attack literature, where, for example, the attacker might procure scoring information for each byte of an Advanced Encryption Standard (AES) key from a side-channel attack and then want to efficiently enumerate and test a large number of complete 16-byte candidates until the correct key is found. After establishing such a connection between the key recovery problem and the key enumeration problem, we will present a comprehensive review of the most outstanding key enumeration algorithms to tackle the latter problem, for example, an optimal key enumeration algorithm (OKEA) and several nonoptimal key enumeration algorithms. Also, we will propose variants to some of them and make a comparison of them, highlighting their strengths and weaknesses.
format Online
Article
Text
id pubmed-7514303
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-75143032020-11-09 A Comprehensive Study of the Key Enumeration Problem Villanueva-Polanco, Ricardo Entropy (Basel) Article In this paper, we will study the key enumeration problem, which is connected to the key recovery problem posed in the cold boot attack setting. In this setting, an attacker with physical access to a computer may obtain noisy data of a cryptographic secret key of a cryptographic scheme from main memory via this data remanence attack. Therefore, the attacker would need a key-recovery algorithm to reconstruct the secret key from its noisy version. We will first describe this attack setting and then pose the problem of key recovery in a general way and establish a connection between the key recovery problem and the key enumeration problem. The latter problem has already been studied in the side-channel attack literature, where, for example, the attacker might procure scoring information for each byte of an Advanced Encryption Standard (AES) key from a side-channel attack and then want to efficiently enumerate and test a large number of complete 16-byte candidates until the correct key is found. After establishing such a connection between the key recovery problem and the key enumeration problem, we will present a comprehensive review of the most outstanding key enumeration algorithms to tackle the latter problem, for example, an optimal key enumeration algorithm (OKEA) and several nonoptimal key enumeration algorithms. Also, we will propose variants to some of them and make a comparison of them, highlighting their strengths and weaknesses. MDPI 2019-10-05 /pmc/articles/PMC7514303/ http://dx.doi.org/10.3390/e21100972 Text en © 2019 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Villanueva-Polanco, Ricardo
A Comprehensive Study of the Key Enumeration Problem
title A Comprehensive Study of the Key Enumeration Problem
title_full A Comprehensive Study of the Key Enumeration Problem
title_fullStr A Comprehensive Study of the Key Enumeration Problem
title_full_unstemmed A Comprehensive Study of the Key Enumeration Problem
title_short A Comprehensive Study of the Key Enumeration Problem
title_sort comprehensive study of the key enumeration problem
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7514303/
http://dx.doi.org/10.3390/e21100972
work_keys_str_mv AT villanuevapolancoricardo acomprehensivestudyofthekeyenumerationproblem
AT villanuevapolancoricardo comprehensivestudyofthekeyenumerationproblem