Loading [MathJax]/extensions/MathMenu.js
A Distributed Identity Authentication Scheme for Differential Fault Attack | IEEE Conference Publication | IEEE Xplore

A Distributed Identity Authentication Scheme for Differential Fault Attack


Abstract:

Aiming at the problem of limited computing resources in the current Internet of Things terminals, this paper proposes a method to split ID for distributed identity authen...Show More

Abstract:

Aiming at the problem of limited computing resources in the current Internet of Things terminals, this paper proposes a method to split ID for distributed identity authentication. This paper takes SM4 as 128-bit encryption algorithm and GIFT as 64-bit encryption algorithm, and analyzes the security of them in the case of differential fault attack. At the same time, we calculated that the 128-bit length ID can be split into two sub-IDs of 64-bit length for authentication, and each sub-ID can be sent 19 times, which can offset the security risks caused by the reduction of grouping length caused by the encryption algorithm. Finally, we simulate the time delay of 128-bit authentication and 64-bit distributed authentication, which further proves the superiority of distributed authentication in the environment with limited computing resources.
Date of Conference: 13-16 October 2021
Date Added to IEEE Xplore: 04 January 2022
ISBN Information:

ISSN Information:

Conference Location: Tianjin, China

I. Introduction

In recent years, with the rapid development of the Internet of Things (IoT) technology, the number of IoT terminals is also growing rapidly. However, due to the limited computing resources of the IoT terminals, the traditional heavy cryptographic algorithm is difficult to be applied well in the identification process of such devices. Therefore, many scholars have applied lightweight cryptographic algorithms in such environments with limited computing resources [1]. However, because of its low security and weak encryption strength, lightweight cipher may lead to illegal identity attacks. Therefore, we need to design a special identity authentication mode for the limited computing resources of the IoT terminals [2].

Contact IEEE to Subscribe

References

References is not available for this document.