In this paper, we propose a novel class of symmetric key distribution protocols that leverages basic security primitives offered by low-cost, hardware chipsets containing millions of synchronized self-powered timers. The keys are derived from the temporal dynamics of a physical, micro-scale time-keeping device which makes the keys immune to any potential side-channel attacks, malicious tampering, or snooping. Using the behavioral model of the self-powered timers, we first show that the derived key-strings can pass the randomness test as defined by the National Institute of Standards and Technology (NIST) suite. The key-strings are then used in two SPoTKD (Self-Powered Timer Key Distribution) protocols that exploit the timer's dynamics as one-way functions: (a) protocol 1 facilitates secure communications between a user and a remote Server, and (b) protocol 2 facilitates secure communications between two users. In this paper, we investigate the security of these protocols under standard model and against different adversarial attacks. Using Monte-Carlo simulations, we also investigate the robustness of these protocols in the presence of real-world operating conditions and propose error-correcting SPoTKD protocols to mitigate these noise-related artifacts.
翻译:在本文中,我们提出一套新型的对称关键分配协议,利用由低成本硬件芯片提供的基本安全原始设备,这些硬件芯片包含数以百万计的同步自动计时器。这些钥匙来自一个物理的、微型的时间保存装置的时间动态,使钥匙免受任何可能的侧道攻击、恶意篡改或窥探。使用自动定时器的行为模式,我们首先显示,衍生的关键字符串可以通过国家标准和技术研究所(NIST)套件定义的随机性测试。然后,关键字符串用于两个SPOTKD(自发的定时器钥匙发布)协议,这些协议将定时器的动态用作单向功能:(a) 协议1便于用户和远程服务器之间的安全通信,以及(b) 协议2便于两个用户之间的安全通信。在本文中,我们根据标准模式调查这些协议的安全性以及针对不同的对抗性攻击。我们利用蒙特卡洛模拟,我们还调查这些协议在现实-地球的运行条件中是否可靠。