DOI QR코드

DOI QR Code

Power Analysis Attacks and Countermeasures on NTRU-Based Wireless Body Area Networks

  • Wang, An (Institute for Advanced Study, Tsinghua University) ;
  • Zheng, Xuexin (Key Lab of Cryptologic Technology and Information Security Ministry of Education, Shandong University) ;
  • Wang, Zongyue (Key Lab of Cryptologic Technology and Information Security Ministry of Education, Shandong University)
  • Received : 2012.10.14
  • Accepted : 2013.03.05
  • Published : 2013.05.30

Abstract

NTRU cryptosystem has been suggested for protecting wireless body area networks, which is secure in the sense of traditional cryptanalysis. In this paper, we fulfill the first power analysis attack on the ultra-low-power environment of wireless body area networks. Specifically, two practical differential power analyses on NTRU algorithm are proposed, which can attack the existing countermeasures of NTRU. Accordingly, we suggest three countermeasures against our attacks. Meanwhile, practical experiments show that although the attacks in this paper are efficient, our countermeasures can resist them effectively.

Keywords

References

  1. B. Latre, B. Braem, I. Moerman, C. Blondia, P. Demeester, "A survey on wireless body area networks," in Proc. of Wireless Networks, vol. 17, no. 1, pp. 1-18, Springer, Heidelberg, 2011. https://doi.org/10.1007/s11276-010-0252-4
  2. A.J. Menezes, P.C. Van Oorschot, and S.A. Vanstone, Handbook of applied cryptography. CRC Press, 1997.
  3. A. Perrig, R. Szewczyk, JD. Tygar, V. Wen, DE. Culler, "Spins: security protocols for sensor networks," in Proc. of Wireless Networks, vol. 8, no. 5, pp. 521-534, Springer, Heidelberg, 2002. https://doi.org/10.1023/A:1016598314198
  4. J. Hoffstein, J. Pipher, J. Silverman, "NTRU: A ring-based public key cryptosystem," in Proc. of Algorithmic Number Theory (ANTS III). LNCS, vol. 1423, pp. 267-288, Springer, Heidelberg, 1998.
  5. IEEE Std P1363.1-2008, "IEEE standard specification for public key cryptographic techniques based on hard problems over lattices," 2009.
  6. J. Hoffstein, J. Pipher, J.H. Silverman, "NSS: An NTRU lattice-based signature scheme," in Proc. of Eurocrypt 2001, LNCS, vol. 2045, pp. 211-228, Springer, Heidelberg, 2001.
  7. F. Hu, Q. Hao, M. Lukowiak, Q. Sun, K. Wilhelm, S. Radziszowski, Y. Wu, "Trustworthy data collection from implantable medical devices via high-speed security implementation based on IEEE 1363," IEEE Transactions on Information Technology in Biomedicine, vol. 14, no. 6, pp. 1397-1404, 2010. https://doi.org/10.1109/TITB.2010.2049204
  8. F. Hu, K. Wilhelm, M. Schab, M. Lukowiak, S. Radziszowski, Y. Xiao, "NTRU-based sensor network security: a low-power hardware implementation perspective," Security Comm. Networks. vol. 2009, no. 2, pp. 71-81, 2009.
  9. P. Kocher, J. Jaffe, B. Jun, "Differential power analysis," in Proc. of Crypto 1999, LNCS, vol. 1666, pp. 388-397, Springer, Heidelberg, 1999.
  10. D. Canright, L. Batina, "A very compact perfectly masked S-Box for AES," in Proc. of ACNS 2008, LNCS, vol. 5037, pp. 446-459, Springer, Heidelberg, 2008.
  11. H. Kim, S. Hong, J. Lim, "A fast and provably secure higher-order masking of AES S-Box," in Proc. of CHES 2011, LNCS, vol. 6917, pp. 95-107, Springer, Heidelberg, 2011.
  12. C. Clavier, B. Feix, G. Gagnerot, M. Roussellet, V. Verneuil, "Improved collision-correlation power analysis on first order protected AES," in Proc. of CHES 2011, LNCS, vol. 6917, pp. 49-62, Springer, Heidelberg, 2011.
  13. A. Moradi, O. Mischke, T. Eisenbarth, "Correlation-enhanced power analysis collision attack," in Proc. of CHES 2010, LNCS, vol. 6225, pp. 125-139, Springer, Heidelberg, 2010.
  14. M. Lee, J. Song, D. Choi, D. Han, "Countermeasures against the power analysis attack for the NTRU public key cryptosystem," IEICE TRANSACTIONS on Fundamentals of Electronics, vol. E93-A, no. 1, pp. 153-163, 2010. https://doi.org/10.1587/transfun.E93.A.153
  15. A. Bhargava, M. Zoltowski, "Sensors and wireless communication for medical care," in Proc. of 14th International Workshop on Database and Expert Systems Applications, pp. 956-960, 2003.
  16. G. Selimis, L. Huang, F. Masse, I. Tsekoura, M. Ashouei, F. Catthoor, J. Huisken, J. Stuyt, G. Dolmans, J. Penders, H. Groot, "A lightweight security scheme for wireless body area networks: design, energy, evaluation and proposed microprocessor design," Journal of Medical Systems, vol. 2011, no. 35, pp. 1289-1298, 2011.
  17. M. Mana, M. Feham, B. Bensaber, "A light weight protocol to provide location privacy in wireless body area networks," International Journal of Network Security & Its Applications, vol. 3, no. 2, pp. 1-11, 2011.
  18. P. Xiong, W. Zhang, G. Lu, "Secure neighbor relation in wireless sensor network," in Proc. of 4th International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1-4, IEEE, 2008.
  19. F. Hu, Q. Hao, M. Lukowiak, "Implantable medical device communication security: pattern vs. signal encryption (position paper)," in Proc. of the 2nd USENIX Conference on Health Security and Privacy, pp. 1-2, USENIX Association, 2011.
  20. A. Atici, L. Batina, B. Gierlichs, I. Verbauwhede, "Power analysis on NTRU implementations for RFIDs: First results," in Proc. of RFIDSec 2008, pp. 128-139, 2008.
  21. E. Brier, C. Clavier, F. Olivier, "Correlation power analysis with a leakage model," in Proc. of CHES 2004, LNCS, vol. 3156, pp. 16-29, Springer, Heidelberg, 2004.
  22. S. Mangard, E. Oswald, T. Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards, Springer, Heidelberg, 2007.
  23. J. Irwin, D. Page, N.P. Smart, "Instruction stream mutation for non-deterministic processors," in Proc. of IEEE International Conference on Application-Specific Systems, Architectures and Processors, pp. 286-295, IEEE Computer Society, Los Alamitos, 2002.