计算机科学 ›› 2017, Vol. 44 ›› Issue (10): 159-164.doi: 10.11896/j.issn.1002-137X.2017.10.030

• 信息安全 • 上一篇    下一篇

DWNAF:带门限的动态窗口的NAF标量乘法

史量,徐明   

  1. 上海海事大学信息工程学院 上海201306,上海海事大学信息工程学院 上海201306
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受国家自然科学基金项目(61202370),上海市教委科研创新项目(14YZ110),中国博士后科学基金资助

DWNAF:A Dynamic Window NAF Scalar Multiplication with Threshold

SHI Liang and XU Ming   

  • Online:2018-12-01 Published:2018-12-01

摘要: 为了提高水声信道传输数据的安全性,针对非对称加密对节点性能要求较高的问题,提出了一种带门限的动态窗口的NAF标量乘法(DWNAF)。该方法 通过“门限” 对经典的窗口法的窗口大小进行动态控制,优化了预处理过程,有效降低了预计算和标量乘计算的开销。实验表明,在预计算量相同的情况下,DWNAF的点加次数仅为RWNAF的25%。在安全性方面,DWNAF采用窗口法、平衡能量法与masking方法相结合的方式,能有效抵御SPA,DPA及其变种RPA和ZPA等常见的边信道攻击。

关键词: 水下声传感器网络,边信道攻击,数据安全,NAF

Abstract: In order to improve the safety of the data transmission in underwater acoustic channel,in view of the fact that asymmetric encryption requires high performance of nodes, a dynamic window NAF scalar multiplication with a thre-shold (DWNAF) was proposed for underwater acoustic sensor networks.The method is based on the classic width-ω NAF method through a “threshold” for dynamic control,and it can optimize the pretreatment process and effectively reduce the pre-calculation in scalar multiplication.Experimental results show that under the same pre-calculation,the point-add in DWNAF is only 25% of that in RWNAF.In security,DWNAF adopts the combination of window method,energy balance method and masking method,which can effectively resist the common side channel attacks such as SPA,DPA and its variants RPA and ZPA.

Key words: Underwater acoustic sensor network,Side channel attack,Data security,NAF

[1] KOBLITZ N.Elliptic curve cryptosystems[J].Mathematics of Computation,1987,48:203-209.
[2] MILLER V S.Use of elliptic curves in cryptography,Advances in Cryptology[C]∥Proceedings of Crypto’85.Lecture Notes in Computer Science,1986:417-426 .
[3] WANG Y.The design and implementation of ECC to against SCA on smart card[D].Beijing:Beijing Jiaotong University,2009.(in Chinese) 王阳.智能卡上抗边通道攻击的椭圆曲线密码算法的设计与实现[D].北京:北京交通大学,2009.
[4] 维基百科.Non-adjacent form.(2016-05-11) [2016-10-04].https://en.wikipedia.org/wiki/Non-adjacent_form.
[5] KOYAMA K,TSURUOKA Y.Speeding up elliptic cryptosys-tems by using a signed binary window method,Advances in Cryptology[C]∥Proceedings of Crypto’92.Lecture Notes in Computer Science,1993:345-357.
[6] KOEHER P.Timing attacks on Implementations of Diffie-Hellman,RSA,DSS,and other system[C]∥CRYPTO 96.Springer-Verlag,1996:104-113.
[7] OKEYA K,TAKAGI T.A More Flexible Countermeasureagainst Side Channel Attacks Using Window Method[C]∥ International Workshop on Cryptographic Hardware & Embedded Systems-ches.Cologne,Germany,2003:397-410.
[8] WANG M,WU Z.Algrithm of NAF scalar multiplication on ECC against SPA[J].Journal on Communications,2012(S1):228-232.(in Chinese) 王敏,吴震.抗SPA攻击的椭圆曲线NAF标量乘实现算法[J].通信学报,2012(S1):228-232.
[9] HIDEYO M,ATSUKO M,HIROAKI M.Efficient Counter-measures against RPA,DPA,and SPA[C]∥Lecture Notes in Computer Science.2004:343-356.
[10] WANG J,CHEN J F,ZHANG L J,et al.Underwater sensor networks[J].Technical Acoustics,2009,8(1):89-94.(in Chinese) 王静,陈建峰,张立杰,等.水下无线传感器网络[J].声学技术,2009,28(1):89-94.
[11] PANAGIOTIS T,ZAHARIADIS T,H ELEN L,et al.Analyzing energy and time overhead of security mechanisms in Wireless Sensor Networks[C]∥15th International Conference on Systems,Signals and Image Processing(IWSSIP).2008:137-140.
[12] MALAN D J,WELSH M,SMITH M D.A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography[C]∥IEEE International Conference on Sensor and Ad Hoc Communications and Networks.2004:71-80.
[13] TORAL R,CHAKRABARTI A.Generation of Gaussian dis-tributed random numbers by using a numerical inversion method[J].Computer Physics Communications,1993,74(3):327-334.
[14] LI R P.The development status and trends of ocean engineering technology[J].Ship Economy & Trade,2002,2(1):1-5.(in Chinese) 李润培.海洋工程技术发展现状及趋势[J].船舶经济贸易,2002,42(1):1-5.
[15] ZHANG T,FAN M Y,WANG G W.Protection against Power Analysis Attack for ECC on Smartcard[J].Computer Enginee-ring,2007,3(14):125-127.(in Chinese) 张涛,范明钰,王光卫,等.Smartcard上椭圆曲线密码算法的能量攻击和防御[J].计算机工程,2007,33(14):125-127.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] 雷丽晖,王静. 可能性测度下的LTL模型检测并行化研究[J]. 计算机科学, 2018, 45(4): 71 -75, 88 .
[2] 夏庆勋,庄毅. 一种基于局部性原理的远程验证机制[J]. 计算机科学, 2018, 45(4): 148 -151, 162 .
[3] 厉柏伸,李领治,孙涌,朱艳琴. 基于伪梯度提升决策树的内网防御算法[J]. 计算机科学, 2018, 45(4): 157 -162 .
[4] 王欢,张云峰,张艳. 一种基于CFDs规则的修复序列快速判定方法[J]. 计算机科学, 2018, 45(3): 311 -316 .
[5] 孙启,金燕,何琨,徐凌轩. 用于求解混合车辆路径问题的混合进化算法[J]. 计算机科学, 2018, 45(4): 76 -82 .
[6] 张佳男,肖鸣宇. 带权混合支配问题的近似算法研究[J]. 计算机科学, 2018, 45(4): 83 -88 .
[7] 伍建辉,黄中祥,李武,吴健辉,彭鑫,张生. 城市道路建设时序决策的鲁棒优化[J]. 计算机科学, 2018, 45(4): 89 -93 .
[8] 刘琴. 计算机取证过程中基于约束的数据质量问题研究[J]. 计算机科学, 2018, 45(4): 169 -172 .
[9] 钟菲,杨斌. 基于主成分分析网络的车牌检测方法[J]. 计算机科学, 2018, 45(3): 268 -273 .
[10] 史雯隽,武继刚,罗裕春. 针对移动云计算任务迁移的快速高效调度算法[J]. 计算机科学, 2018, 45(4): 94 -99, 116 .