Adversary Model: Adaptive Chosen Ciphertext Attack with Timing Attack [article]

Mohd Anuar Mat Isa, Habibah Hashim
2014 pre-print
We have introduced a novel adversary model in Chosen-Ciphertext Attack with Timing Attack (CCA2-TA) and it was a practical model because the model incorporates the timing attack. This paper is an extended paper for 'A Secure TFTP Protocol with Security Proofs'. Keywords - Timing Attack, Random Oracle Model, Indistinguishabilit, Chosen Plaintext Attack, CPA, Chosen Ciphertext Attack, IND-CCA1, Adaptive Chosen Ciphertext Attack, IND-CCA2, Trivial File Transfer Protocol, TFTP, Security, Trust,
more » ... acy, Trusted Computing, UBOOT, AES, IOT, Lightweight, Asymmetric, Symmetric, Raspberry Pi, ARM.
doi:10.13140/rg.2.1.1699.4800 arXiv:1409.6556v1 fatcat:petq4rnohnenxehaabubqrcc3m