Towards secure communications: Review of side channel attacks and countermeasures on ECC

L. Tawalbeh, T. Al-Somani, Hilal Houssain
{"title":"Towards secure communications: Review of side channel attacks and countermeasures on ECC","authors":"L. Tawalbeh, T. Al-Somani, Hilal Houssain","doi":"10.1109/ICITST.2016.7856673","DOIUrl":null,"url":null,"abstract":"There are many recent revolutionary technologies and advances in wireless communication and networking that changed the lives of millions of people around us. The wide spread of the Internet and the smart mobile devices which is equipped with wireless technologies to access the Internet, enabled people to contact each other regardless of their geographic location. These communications involve sharing and transferring sensitive information that must be protected. Therefore, there is an increasing need to secure the individuals and organizations data which is considered a big challenge in communication and networking systems nowadays. The cryptographic algorithms are used to provide many security services to secure the communication channels and networks such as authentication, data integrity and confidentiality. But, recently, there are cyber attacks on these crypto-functions and their implementations, mainly Side Channel Attacks. So, compromising the security of these algorithms implies compromising the security of the communication systems that are using them. Among the most known asymmetric encryption algorithms is the Elliptic Curve Cryptography which is used to protect sensitive data in many financial and government applications. In this research, we present most recent Side channel attacks on Elliptic Curve Cryptography. Also, we discuss the suitable effective countermeasures used to protect from these cyber attacks towards obtaining more secure communication systems.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITST.2016.7856673","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

Abstract

There are many recent revolutionary technologies and advances in wireless communication and networking that changed the lives of millions of people around us. The wide spread of the Internet and the smart mobile devices which is equipped with wireless technologies to access the Internet, enabled people to contact each other regardless of their geographic location. These communications involve sharing and transferring sensitive information that must be protected. Therefore, there is an increasing need to secure the individuals and organizations data which is considered a big challenge in communication and networking systems nowadays. The cryptographic algorithms are used to provide many security services to secure the communication channels and networks such as authentication, data integrity and confidentiality. But, recently, there are cyber attacks on these crypto-functions and their implementations, mainly Side Channel Attacks. So, compromising the security of these algorithms implies compromising the security of the communication systems that are using them. Among the most known asymmetric encryption algorithms is the Elliptic Curve Cryptography which is used to protect sensitive data in many financial and government applications. In this research, we present most recent Side channel attacks on Elliptic Curve Cryptography. Also, we discuss the suitable effective countermeasures used to protect from these cyber attacks towards obtaining more secure communication systems.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
迈向安全通信:侧信道攻击与ECC对抗综述
最近在无线通信和网络方面有许多革命性的技术和进步,改变了我们周围数百万人的生活。互联网的广泛普及和配备无线技术接入互联网的智能移动设备,使人们能够彼此联系,而不受地理位置的限制。这些通信涉及共享和传输必须受到保护的敏感信息。因此,越来越需要保护个人和组织的数据,这被认为是当今通信和网络系统的一大挑战。加密算法用于提供许多安全服务,以确保通信通道和网络的安全,如身份验证、数据完整性和机密性。但是,最近出现了针对这些加密功能及其实现的网络攻击,主要是侧信道攻击。因此,危及这些算法的安全性意味着危及使用它们的通信系统的安全性。在最著名的非对称加密算法中,椭圆曲线加密算法被用于保护许多金融和政府应用中的敏感数据。在这项研究中,我们介绍了最新的椭圆曲线密码的侧信道攻击。此外,我们还讨论了用于保护这些网络攻击的适当有效对策,以获得更安全的通信系统。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Which metrics for vertex-cut partitioning? Compressive Sensing encryption modes and their security Range query integrity in the cloud: the case of video surveillance Performance study of the index structures in audited environment System and Protocols for secure Intercloud Communications
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1