期刊文献+

无线传感器网络节点明文分布对差分功耗分析成功率的影响

Effect of distribution of plaintext on DPA in WSN nodes
下载PDF
导出
摘要 无线传感器网络WSN节点中的加密模块往往面临着侧信道攻击SCA的威胁。然而由于WSN节点加密的数据来自于实际的物理信号,明文的分布将会遵循其物理规律,这一点与通常讨论侧信道攻击安全性时假设明文为完全随机的情形不同。为了探索当攻击者用的明文是传感器采集到的实际非均匀分布的信号时差分功耗分析DPA的成功率,该论文从理论和实验上分析了明文分布与分组密码DPA的成功率之间的关系。结论是DPA成功率负相关于明文分布与均匀分布之间的Cramer-von-Mises统计距离。根据这一结论,可以得出当攻击者攻击时能够构造明文,其利用随机均匀分布明文的成功率高;当攻击时只能利用实际数据,攻击最后一轮比攻击第一轮成功率高。 Cryptographic modules in wireless sensor network (WSN) nodes often face side channel attack threat. However, since the data encrypted in WSN nodes comes from natural physical signals, the distribution of plaintext will follow their natural properties, in all probability instead of being uni- formly random. In order to explore the success rate of differential power analysis (DPA) when applied to nonuniform-distributed data from real sensors, we theoretically and experimentally analyze the rela- tionship between the distribution of plaintext and the success rate of DPA on block ciphers. It turns out that the success rate of DPA targeting the first round is negatively correlated to the Cramer von-Mises distance between the plaintext's distribution and the uniform distribution. The conclusion infers that if the attacker can construct plaintext, the uniform data makes the biggest success rate, and if the attacker only has access to real data, attacking the last round is better than attacking the first round.
出处 《计算机工程与科学》 CSCD 北大核心 2017年第6期1070-1078,共9页 Computer Engineering & Science
关键词 侧信道攻击 无线传感器网络 DPA 成功率 明文分布 side channel analysis WSN DPA success rate distribution of plaintext
  • 相关文献

参考文献1

二级参考文献7

  • 1ECRYPT. The Side Channel Cryptanalysis Lounge. http:// www. crypto, ruhr-uni-bochum, de/en sclounge, html, 2010 4 15.
  • 2Kocher P, Jaffe J, Jun B. Differential Power Analysis [C]// CRYPTO ' 99. LNCS 1666. Springer-Verlag, 1999 : 388 397.
  • 3Bogdanov A, Knudsen L R, Leander G, et al. PRESENT: An UI tra_lightweight BlockCipher[EB/OL]. http://www, ist_ubisecsens. org/publication/present_ches2007, pdf, 2007-04-03.
  • 4Brier E, Clavier C, Olivier E. Correlation power analysis with a leakage model[A]//Joye M, Quisquater J J, eds. Cryptographic Hardware Embedded System-CHES 2004 [C]. Volume 3156 of Lecture Notes in Computer Science. Springe>Verlag, 2004.. 16- 29.
  • 5褚杰,丁国良,邓高明,赵强.DES差分功耗分析攻击设计与实现[J].小型微型计算机系统,2007,28(11):2070-2073. 被引量:12
  • 6李浪,李仁发,Edwin H.-M.Sha.安全SoC抗功耗攻击研究综述[J].计算机科学,2009,36(6):16-18. 被引量:14
  • 7邬可可,李慧云,于峰崎.对同步流密码设备的相关性功耗分析(CPA)攻击[J].高技术通讯,2009,19(11):1142-1147. 被引量:3

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部