P. Shah, Tabassum Ara, Javeria Ambareen, Xu Huang, Vinay V. Hegde
{"title":"WSN平台上椭圆曲线密码中简单功率分析攻击的预防","authors":"P. Shah, Tabassum Ara, Javeria Ambareen, Xu Huang, Vinay V. Hegde","doi":"10.1109/ICETET.2015.28","DOIUrl":null,"url":null,"abstract":"All ECC protocols are based on point addition and point doubling operations. These two operations requires dissimilar power and execution time on WSN node. In binary method of scalar multiplication, point addition always corresponds to 1 and point doubling corresponds to 0. The private key of the WSN node is recoded in the form of 1 and 0, while doing scalar multiplication. All these knowledge in the public domain provides sufficient side channel leakage at lower levels to the attacker to know the entire key in the sequence of 1 and 0 by analyzing power consumption of microcontroller and time required for execution on WSN node for particular cryptographic routine. These types of attacks are not theoretical and can be carried out with instruments such as power oscilloscopes to measure the power consumption of sensor nodes while implementing cryptographic algorithm. This paper also discuss the counter measures available for defending simple power analysis attacks.","PeriodicalId":127139,"journal":{"name":"2015 7th International Conference on Emerging Trends in Engineering & Technology (ICETET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Prevention of Simple Power Analysis Attacks in Elliptical Curve Cryptography on WSN Platform\",\"authors\":\"P. Shah, Tabassum Ara, Javeria Ambareen, Xu Huang, Vinay V. Hegde\",\"doi\":\"10.1109/ICETET.2015.28\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"All ECC protocols are based on point addition and point doubling operations. These two operations requires dissimilar power and execution time on WSN node. In binary method of scalar multiplication, point addition always corresponds to 1 and point doubling corresponds to 0. The private key of the WSN node is recoded in the form of 1 and 0, while doing scalar multiplication. All these knowledge in the public domain provides sufficient side channel leakage at lower levels to the attacker to know the entire key in the sequence of 1 and 0 by analyzing power consumption of microcontroller and time required for execution on WSN node for particular cryptographic routine. These types of attacks are not theoretical and can be carried out with instruments such as power oscilloscopes to measure the power consumption of sensor nodes while implementing cryptographic algorithm. This paper also discuss the counter measures available for defending simple power analysis attacks.\",\"PeriodicalId\":127139,\"journal\":{\"name\":\"2015 7th International Conference on Emerging Trends in Engineering & Technology (ICETET)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 7th International Conference on Emerging Trends in Engineering & Technology (ICETET)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICETET.2015.28\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 7th International Conference on Emerging Trends in Engineering & Technology (ICETET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICETET.2015.28","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Prevention of Simple Power Analysis Attacks in Elliptical Curve Cryptography on WSN Platform
All ECC protocols are based on point addition and point doubling operations. These two operations requires dissimilar power and execution time on WSN node. In binary method of scalar multiplication, point addition always corresponds to 1 and point doubling corresponds to 0. The private key of the WSN node is recoded in the form of 1 and 0, while doing scalar multiplication. All these knowledge in the public domain provides sufficient side channel leakage at lower levels to the attacker to know the entire key in the sequence of 1 and 0 by analyzing power consumption of microcontroller and time required for execution on WSN node for particular cryptographic routine. These types of attacks are not theoretical and can be carried out with instruments such as power oscilloscopes to measure the power consumption of sensor nodes while implementing cryptographic algorithm. This paper also discuss the counter measures available for defending simple power analysis attacks.