Adversary Model: Adaptive Chosen Ciphertext Attack with Timing Attack
Abstract
We have introduced a novel adversary model in Chosen-Ciphertext Attack with Timing Attack (CCA2-TA) and it was a practical model because the model incorporates the timing attack. This paper is an extended paper for 'A Secure TFTP Protocol with Security Proofs'. Keywords - Timing Attack, Random Oracle Model, Indistinguishabilit, Chosen Plaintext Attack, CPA, Chosen Ciphertext Attack, IND-CCA1, Adaptive Chosen Ciphertext Attack, IND-CCA2, Trivial File Transfer Protocol, TFTP, Security, Trust, Privacy, Trusted Computing, UBOOT, AES, IOT, Lightweight, Asymmetric, Symmetric, Raspberry Pi, ARM.
- Publication:
-
arXiv e-prints
- Pub Date:
- September 2014
- DOI:
- 10.48550/arXiv.1409.6556
- arXiv:
- arXiv:1409.6556
- Bibcode:
- 2014arXiv1409.6556A
- Keywords:
-
- Computer Science - Cryptography and Security
- E-Print:
- Extended paper for 'A Secure TFTP Protocol with Security Proofs', in Lecture Notes in Engineering and Computer Science: Proceedings of The World Congress on Engineering 2014, (WCE 2014), 2014, vol. 1