Power Analysis Attacks on ECC: A Major Security Threat
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2012, Vol 3, Issue 6
Abstract
Wireless sensor networks (WSNs) are largely deployed in different sectors and applications, and Elliptic Curve Cryptography (ECC) is proven to be the most feasible PKC for WSN security. ECC is believed to provide same level of security such as RSA with a much shorter key length, and thus they seem to be ideal for applications with small resources such a sensor network, smartcard, RFID, etc. However, like any other cryptographic primitive, ECC implementations are vulnerable to Power Analysis Attacks (PAAs) that may reveal the secret keys by exploiting leaked power consumption from running cryptographic devices (e.g. smart cards, mobile phones etc.). In this paper, we present a comprehensive study of major PAAs and its countermeasures on ECC cryptosystems. In addition, this paper describes critical concerns to be considered in designing PAAs on ECC particular for WSNs, and illustrates the need to conduct, in the near future, intensive researches for the development of these specific PAAs.
Authors and Affiliations
Hilal Houssain, Mohamad Badra, Turki Al-Somani, Senior Member, IEEE
Assessment of IPv4 and IPv6 Networks with Different Modified Tunneling Techniques using OPNET
Currently, all the devices are using Internet protocol version 4 (IPv4) to access the internet. IP addresses of the IPv4 are now depleted from IPv4 pool announced by IANA (Internet Assigned Number Authority) in February...
Design, Release, Update, Repeat: The Basic Process of a Security Protocol’s Evolution
Companies, businesses, colleges, etc. throughout the world use computer networks and telecommunications to run their operations. The convenience, information-gathering, and organizational abilities provided by computer n...
Optimizing the Behaviour of Web Users Through Expectation Maximization Algorithm and Mixture of Normal Distributions
The proposed work is to analyse the user’s behaviour in web access. Worldwide, the web users are browsing through different websites every second. Aim of this paper is to identify the behaviour of user's in a time bound...
Agent-based Managing for Grid Cloud System — Design and Prototypal Implementation
Here, we present the design and architecture of an Agent-based Manager for Grid Cloud Systems (AMGCS) using software agents to ensure independency and scalability when the number of resources and jobs increase. AMGCS han...
On Integrating Mobile Applications into the Digital Forensic Investigative Process
What if a tool existed that allowed digital forensic investigators to create their own apps that would assist them with the evidence identification and collection process at crime scenes? First responders are responsible...