Prevention of Simple Power Analysis Attacks in Elliptical Curve Cryptography on WSN Platform

All ECC protocols are based on point addition and point doubling operations. These two operations requires dissimilar power and execution time on WSN node. In binary method of scalar multiplication, point addition always corresponds to 1 and point doubling corresponds to 0. The private key of the WSN node is recoded in the form of 1 and 0, while doing scalar multiplication. All these knowledge in the public domain provides sufficient side channel leakage at lower levels to the attacker to know the entire key in the sequence of 1 and 0 by analyzing power consumption of microcontroller and time required for execution on WSN node for particular cryptographic routine. These types of attacks are not theoretical and can be carried out with instruments such as power oscilloscopes to measure the power consumption of sensor nodes while implementing cryptographic algorithm. This paper also discuss the counter measures available for defending simple power analysis attacks.

[1]  Xu Huang,et al.  Analytical Study of Implementation Issues of Elliptical Curve Cryptography for Wireless Sensor networks , 2010, 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops.

[2]  Simple Power Analysis on Elliptic Curve Cryptosystems and Countermeasures: Practical Work , 2009, 2009 Second International Symposium on Electronic Commerce and Security.

[3]  Xu Huang,et al.  Algorithm Based on One's Complement for Fast Scalar Multiplication in ECC for Wireless Sensor Network , 2010, 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops.

[4]  Fengqi Yu,et al.  Electromagnetic Analysis on Elliptic Curve Cryptosystems: Measures and Counter-Measures for Smart Cards , 2009, 2009 Third International Symposium on Intelligent Information Technology Application.

[5]  P. L. Montgomery Speeding the Pollard and elliptic curve methods of factorization , 1987 .

[6]  Jean-Sébastien Coron,et al.  Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems , 1999, CHES.

[7]  Xu Huang,et al.  Sliding window method with flexible window size for scalar multiplication on wireless sensor network nodes. , 2010, 2010 International Conference on Wireless Communication and Sensor Computing (ICWCSC).

[8]  Marc Joye,et al.  The Montgomery Powering Ladder , 2002, CHES.