A Comprehensive Study of the Key Enumeration Problem

In this paper, we will study the key enumeration problem, which is connected to the key recovery problem posed in the cold boot attack setting. In this setting, an attacker with physical access to a computer may obtain noisy data of a cryptographic secret key of a cryptographic scheme from main memo...

Full description

Bibliographic Details
Main Author: Ricardo Villanueva-Polanco
Format: Article
Language:English
Published: MDPI AG 2019-10-01
Series:Entropy
Subjects:
Online Access:https://www.mdpi.com/1099-4300/21/10/972
id doaj-6e754126f9ed4b719c8136cbac1ae7bc
record_format Article
spelling doaj-6e754126f9ed4b719c8136cbac1ae7bc2020-11-24T21:55:32ZengMDPI AGEntropy1099-43002019-10-01211097210.3390/e21100972e21100972A Comprehensive Study of the Key Enumeration ProblemRicardo Villanueva-Polanco0Computer Science Department, Universidad del Norte, Barranquilla 080001, ColombiaIn this paper, we will study the key enumeration problem, which is connected to the key recovery problem posed in the cold boot attack setting. In this setting, an attacker with physical access to a computer may obtain noisy data of a cryptographic secret key of a cryptographic scheme from main memory via this data remanence attack. Therefore, the attacker would need a key-recovery algorithm to reconstruct the secret key from its noisy version. We will first describe this attack setting and then pose the problem of key recovery in a general way and establish a connection between the key recovery problem and the key enumeration problem. The latter problem has already been studied in the side-channel attack literature, where, for example, the attacker might procure scoring information for each byte of an Advanced Encryption Standard (AES) key from a side-channel attack and then want to efficiently enumerate and test a large number of complete 16-byte candidates until the correct key is found. After establishing such a connection between the key recovery problem and the key enumeration problem, we will present a comprehensive review of the most outstanding key enumeration algorithms to tackle the latter problem, for example, an optimal key enumeration algorithm (OKEA) and several nonoptimal key enumeration algorithms. Also, we will propose variants to some of them and make a comparison of them, highlighting their strengths and weaknesses.https://www.mdpi.com/1099-4300/21/10/972cold boot attackskey recoveryenumerationalgorithms
collection DOAJ
language English
format Article
sources DOAJ
author Ricardo Villanueva-Polanco
spellingShingle Ricardo Villanueva-Polanco
A Comprehensive Study of the Key Enumeration Problem
Entropy
cold boot attacks
key recovery
enumeration
algorithms
author_facet Ricardo Villanueva-Polanco
author_sort Ricardo Villanueva-Polanco
title A Comprehensive Study of the Key Enumeration Problem
title_short A Comprehensive Study of the Key Enumeration Problem
title_full A Comprehensive Study of the Key Enumeration Problem
title_fullStr A Comprehensive Study of the Key Enumeration Problem
title_full_unstemmed A Comprehensive Study of the Key Enumeration Problem
title_sort comprehensive study of the key enumeration problem
publisher MDPI AG
series Entropy
issn 1099-4300
publishDate 2019-10-01
description In this paper, we will study the key enumeration problem, which is connected to the key recovery problem posed in the cold boot attack setting. In this setting, an attacker with physical access to a computer may obtain noisy data of a cryptographic secret key of a cryptographic scheme from main memory via this data remanence attack. Therefore, the attacker would need a key-recovery algorithm to reconstruct the secret key from its noisy version. We will first describe this attack setting and then pose the problem of key recovery in a general way and establish a connection between the key recovery problem and the key enumeration problem. The latter problem has already been studied in the side-channel attack literature, where, for example, the attacker might procure scoring information for each byte of an Advanced Encryption Standard (AES) key from a side-channel attack and then want to efficiently enumerate and test a large number of complete 16-byte candidates until the correct key is found. After establishing such a connection between the key recovery problem and the key enumeration problem, we will present a comprehensive review of the most outstanding key enumeration algorithms to tackle the latter problem, for example, an optimal key enumeration algorithm (OKEA) and several nonoptimal key enumeration algorithms. Also, we will propose variants to some of them and make a comparison of them, highlighting their strengths and weaknesses.
topic cold boot attacks
key recovery
enumeration
algorithms
url https://www.mdpi.com/1099-4300/21/10/972
work_keys_str_mv AT ricardovillanuevapolanco acomprehensivestudyofthekeyenumerationproblem
AT ricardovillanuevapolanco comprehensivestudyofthekeyenumerationproblem
_version_ 1725862035054395392