Computer Science ›› 2017, Vol. 44 ›› Issue (10): 159-164.doi: 10.11896/j.issn.1002-137X.2017.10.030

Previous Articles     Next Articles

DWNAF:A Dynamic Window NAF Scalar Multiplication with Threshold

SHI Liang and XU Ming   

  • Online:2018-12-01 Published:2018-12-01

Abstract: In order to improve the safety of the data transmission in underwater acoustic channel,in view of the fact that asymmetric encryption requires high performance of nodes, a dynamic window NAF scalar multiplication with a thre-shold (DWNAF) was proposed for underwater acoustic sensor networks.The method is based on the classic width-ω NAF method through a “threshold” for dynamic control,and it can optimize the pretreatment process and effectively reduce the pre-calculation in scalar multiplication.Experimental results show that under the same pre-calculation,the point-add in DWNAF is only 25% of that in RWNAF.In security,DWNAF adopts the combination of window method,energy balance method and masking method,which can effectively resist the common side channel attacks such as SPA,DPA and its variants RPA and ZPA.

Key words: Underwater acoustic sensor network,Side channel attack,Data security,NAF

[1] KOBLITZ N.Elliptic curve cryptosystems[J].Mathematics of Computation,1987,48:203-209.
[2] MILLER V S.Use of elliptic curves in cryptography,Advances in Cryptology[C]∥Proceedings of Crypto’85.Lecture Notes in Computer Science,1986:417-426 .
[3] WANG Y.The design and implementation of ECC to against SCA on smart card[D].Beijing:Beijing Jiaotong University,2009.(in Chinese) 王阳.智能卡上抗边通道攻击的椭圆曲线密码算法的设计与实现[D].北京:北京交通大学,2009.
[4] 维基百科.Non-adjacent form.(2016-05-11) [2016-10-04].
[5] KOYAMA K,TSURUOKA Y.Speeding up elliptic cryptosys-tems by using a signed binary window method,Advances in Cryptology[C]∥Proceedings of Crypto’92.Lecture Notes in Computer Science,1993:345-357.
[6] KOEHER P.Timing attacks on Implementations of Diffie-Hellman,RSA,DSS,and other system[C]∥CRYPTO 96.Springer-Verlag,1996:104-113.
[7] OKEYA K,TAKAGI T.A More Flexible Countermeasureagainst Side Channel Attacks Using Window Method[C]∥ International Workshop on Cryptographic Hardware & Embedded Systems-ches.Cologne,Germany,2003:397-410.
[8] WANG M,WU Z.Algrithm of NAF scalar multiplication on ECC against SPA[J].Journal on Communications,2012(S1):228-232.(in Chinese) 王敏,吴震.抗SPA攻击的椭圆曲线NAF标量乘实现算法[J].通信学报,2012(S1):228-232.
[9] HIDEYO M,ATSUKO M,HIROAKI M.Efficient Counter-measures against RPA,DPA,and SPA[C]∥Lecture Notes in Computer Science.2004:343-356.
[10] WANG J,CHEN J F,ZHANG L J,et al.Underwater sensor networks[J].Technical Acoustics,2009,8(1):89-94.(in Chinese) 王静,陈建峰,张立杰,等.水下无线传感器网络[J].声学技术,2009,28(1):89-94.
[11] PANAGIOTIS T,ZAHARIADIS T,H ELEN L,et al.Analyzing energy and time overhead of security mechanisms in Wireless Sensor Networks[C]∥15th International Conference on Systems,Signals and Image Processing(IWSSIP).2008:137-140.
[12] MALAN D J,WELSH M,SMITH M D.A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography[C]∥IEEE International Conference on Sensor and Ad Hoc Communications and Networks.2004:71-80.
[13] TORAL R,CHAKRABARTI A.Generation of Gaussian dis-tributed random numbers by using a numerical inversion method[J].Computer Physics Communications,1993,74(3):327-334.
[14] LI R P.The development status and trends of ocean engineering technology[J].Ship Economy & Trade,2002,2(1):1-5.(in Chinese) 李润培.海洋工程技术发展现状及趋势[J].船舶经济贸易,2002,42(1):1-5.
[15] ZHANG T,FAN M Y,WANG G W.Protection against Power Analysis Attack for ECC on Smartcard[J].Computer Enginee-ring,2007,3(14):125-127.(in Chinese) 张涛,范明钰,王光卫,等.Smartcard上椭圆曲线密码算法的能量攻击和防御[J].计算机工程,2007,33(14):125-127.

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .