Prevention of Simple Power Analysis Attacks in Elliptical Curve Cryptography on WSN Platform

P. Shah, Tabassum Ara, Javeria Ambareen, Xu Huang, Vinay V. Hegde
{"title":"Prevention of Simple Power Analysis Attacks in Elliptical Curve Cryptography on WSN Platform","authors":"P. Shah, Tabassum Ara, Javeria Ambareen, Xu Huang, Vinay V. Hegde","doi":"10.1109/ICETET.2015.28","DOIUrl":null,"url":null,"abstract":"All ECC protocols are based on point addition and point doubling operations. These two operations requires dissimilar power and execution time on WSN node. In binary method of scalar multiplication, point addition always corresponds to 1 and point doubling corresponds to 0. The private key of the WSN node is recoded in the form of 1 and 0, while doing scalar multiplication. All these knowledge in the public domain provides sufficient side channel leakage at lower levels to the attacker to know the entire key in the sequence of 1 and 0 by analyzing power consumption of microcontroller and time required for execution on WSN node for particular cryptographic routine. These types of attacks are not theoretical and can be carried out with instruments such as power oscilloscopes to measure the power consumption of sensor nodes while implementing cryptographic algorithm. This paper also discuss the counter measures available for defending simple power analysis attacks.","PeriodicalId":127139,"journal":{"name":"2015 7th International Conference on Emerging Trends in Engineering & Technology (ICETET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 7th International Conference on Emerging Trends in Engineering & Technology (ICETET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICETET.2015.28","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

All ECC protocols are based on point addition and point doubling operations. These two operations requires dissimilar power and execution time on WSN node. In binary method of scalar multiplication, point addition always corresponds to 1 and point doubling corresponds to 0. The private key of the WSN node is recoded in the form of 1 and 0, while doing scalar multiplication. All these knowledge in the public domain provides sufficient side channel leakage at lower levels to the attacker to know the entire key in the sequence of 1 and 0 by analyzing power consumption of microcontroller and time required for execution on WSN node for particular cryptographic routine. These types of attacks are not theoretical and can be carried out with instruments such as power oscilloscopes to measure the power consumption of sensor nodes while implementing cryptographic algorithm. This paper also discuss the counter measures available for defending simple power analysis attacks.
WSN平台上椭圆曲线密码中简单功率分析攻击的预防
所有ECC协议都基于点加法和点加倍操作。这两种操作在WSN节点上需要不同的功率和执行时间。在二元标量乘法中,点的加法总是对应1,点的加倍总是对应0。将WSN节点的私钥以1和0的形式重新编码,同时进行标量乘法。所有这些公共领域的知识为攻击者提供了足够的底层侧信道泄漏,通过分析微控制器的功耗和在WSN节点上执行特定加密例程所需的时间,攻击者可以知道1和0序列的整个密钥。这些类型的攻击不是理论上的,可以使用功率示波器等仪器来测量传感器节点的功耗,同时实现加密算法。本文还讨论了防御简单功率分析攻击的对策。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信