摘要
无线传感器网络WSN节点中的加密模块往往面临着侧信道攻击SCA的威胁。然而由于WSN节点加密的数据来自于实际的物理信号,明文的分布将会遵循其物理规律,这一点与通常讨论侧信道攻击安全性时假设明文为完全随机的情形不同。为了探索当攻击者用的明文是传感器采集到的实际非均匀分布的信号时差分功耗分析DPA的成功率,该论文从理论和实验上分析了明文分布与分组密码DPA的成功率之间的关系。结论是DPA成功率负相关于明文分布与均匀分布之间的Cramer-von-Mises统计距离。根据这一结论,可以得出当攻击者攻击时能够构造明文,其利用随机均匀分布明文的成功率高;当攻击时只能利用实际数据,攻击最后一轮比攻击第一轮成功率高。
Cryptographic modules in wireless sensor network (WSN) nodes often face side channel attack threat. However, since the data encrypted in WSN nodes comes from natural physical signals, the distribution of plaintext will follow their natural properties, in all probability instead of being uni- formly random. In order to explore the success rate of differential power analysis (DPA) when applied to nonuniform-distributed data from real sensors, we theoretically and experimentally analyze the rela- tionship between the distribution of plaintext and the success rate of DPA on block ciphers. It turns out that the success rate of DPA targeting the first round is negatively correlated to the Cramer von-Mises distance between the plaintext's distribution and the uniform distribution. The conclusion infers that if the attacker can construct plaintext, the uniform data makes the biggest success rate, and if the attacker only has access to real data, attacking the last round is better than attacking the first round.
出处
《计算机工程与科学》
CSCD
北大核心
2017年第6期1070-1078,共9页
Computer Engineering & Science