Side-channel security analysis of UOV signature for cloud-based Internet of Things

作者: Haibo Yi , Zhe Nie

DOI: 10.1016/J.FUTURE.2018.04.083

关键词:

摘要: Abstract Among Internet of Things (IoTs), cloud-based IoTs help retain the confidentiality both device-to-cloud and cloud-to-device messages by setting up individual identities credentials for each IoT devices. As recently been emphasized two American institutes, National Institute Standards Technology (NIST) Security Agency (NSA), that use RSA ECC signatures are insecure under quantum computer attacks. To ensure security in attacks, there is a critical need implementations new quantum-resistance signature systems, such as Unbalanced Oil Vinegar (UOV), making more secure reliable. In order to analyze UOV IoTs, we present an efficient algorithm based on side channel analysis UOV, which combines inducing faults Hamming distance power analysis. We implement schemes Sakura-G FPGA board via using Verilog-HDL code Xilinx ISE software, where collection uses 350 MHz Keysights oscilloscope. Based experimental results, successfully recover all secret keys signature, shows should protect related against attacks when they adopted IoTs.

参考文章(36)
Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann, Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes International Workshop on Post-Quantum Cryptography. pp. 188- 202 ,(2013) , 10.1007/978-3-642-38616-9_13
M. Rajaram, J. Vijaya, A Defense Mechanism for Differential Power Analysis Attack in AES Journal of Computer Science. ,vol. 11, pp. 291- 296 ,(2015) , 10.3844/JCSSP.2015.291.296
Zhenjiu Xiao, Yongbin Wang, Zhengtao Jiang, Research and implementation of four-prime RSA digital signature algorithm annual acis international conference on computer and information science. pp. 545- 549 ,(2015) , 10.1109/ICIS.2015.7166652
Moshe Avital, Hadar Dagan, Osnat Keren, Alexander Fish, Randomized Multitopology Logic Against Differential Power Analysis IEEE Transactions on Very Large Scale Integration Systems. ,vol. 23, pp. 702- 711 ,(2015) , 10.1109/TVLSI.2014.2320154
Hamad Marzouqi, Mahmoud Al-Qutayri, Khaled Salah, Review of gate-level differential power analysis and fault analysis countermeasures Iet Information Security. ,vol. 8, pp. 51- 66 ,(2014) , 10.1049/IET-IFS.2012.0319
R. Arshad, N. Ikram, Elliptic curve cryptography based mutual authentication scheme for session initiation protocol Multimedia Tools and Applications. ,vol. 66, pp. 165- 178 ,(2013) , 10.1007/S11042-011-0787-0
Bo Qu, Dawu Gu, Zheng Guo, Junrong Liu, Differential power analysis of stream ciphers with LFSRs Computers & Mathematics With Applications. ,vol. 65, pp. 1291- 1299 ,(2013) , 10.1016/J.CAMWA.2012.02.024
Felix Wortmann, Kristina Flüchter, Internet of Things - Technology and Value Added Business & Information Systems Engineering. ,vol. 57, pp. 221- 224 ,(2015) , 10.1007/S12599-015-0383-3
Xuan Qiu, Hao Luo, Gangyan Xu, Runyang Zhong, George Q. Huang, Physical assets and service sharing for IoT-enabled Supply Hub in Industrial Park (SHIP) International Journal of Production Economics. ,vol. 159, pp. 4- 15 ,(2015) , 10.1016/J.IJPE.2014.09.001
Chandrashekhar Meshram, Suchitra A. Meshram, An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem Information Processing Letters. ,vol. 113, pp. 375- 380 ,(2013) , 10.1016/J.IPL.2013.02.009