Paper 2004/320

Upper Bounds for the Selection of the Cryptographic Key Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults

Alfonso De Gregorio

Abstract

With physical attacks threatening the security of current cryptographic schemes, no security policy can be developed without taking into account the physical nature of computation. In this article we first introduce the notion of \emph{Cryptographic Key Failure Tolerance}, then we offer a framework for the determination of upper bounds to the key lifetimes for any cryptographic scheme used in the presence of faults, given a desired (negligible) error-bound to the risk of key exposure. Finally we emphasize the importance of choosing keys and designing schemes with good values of failure tolerance, and recommend minimal values for this metric. In fact, in \emph{standard environmental conditions}, cryptographic keys that are especially susceptible to erroneous computations (e.g., RSA keys used with CRT-based implementations) are exposed with a probability greater than a standard error-bound (e.g., ${2^{-40}}$) after operational times shorter than one year, if the failure-rate of the cryptographic infrastructure is greater than ${1.04\times10^{-16}}$ {\it failures/hours}.

Metadata
Available format(s)
PDF PS
Category
Implementation
Publication info
Published elsewhere. Unknown where it was published
Keywords
Key LifetimesFault-AttacksDependabilitySecurity PoliciesKey-ManagementCryptographic Key Failure ToleranceReliability ModelingSide-ChannelsCryptanalysis
Contact author(s)
alfonso degregorio @ acm org
History
2004-11-26: last of 2 revisions
2004-11-24: received
See all versions
Short URL
https://ia.cr/2004/320
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2004/320,
      author = {Alfonso De Gregorio},
      title = {Upper Bounds for the Selection of the Cryptographic Key Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults},
      howpublished = {Cryptology {ePrint} Archive, Paper 2004/320},
      year = {2004},
      url = {https://eprint.iacr.org/2004/320}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.