• Title/Summary/Keyword: AES analysis

Search Result 485, Processing Time 0.027 seconds

Double Sieve Collision Attack Based on Bitwise Detection

  • Ren, Yanting;Wu, Liji;Wang, An
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.296-308
    • /
    • 2015
  • Advanced Encryption Standard (AES) is widely used for protecting wireless sensor network (WSN). At the Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2012, G$\acute{e}$rard et al. proposed an optimized collision attack and break a practical implementation of AES. However, the attack needs at least 256 averaged power traces and has a high computational complexity because of its byte wise operation. In this paper, we propose a novel double sieve collision attack based on bitwise collision detection, and an improved version with an error-tolerant mechanism. Practical attacks are successfully conducted on a software implementation of AES in a low-power chip which can be used in wireless sensor node. Simulation results show that our attack needs 90% less time than the work published by G$\acute{e}$rard et al. to reach a success rate of 0.9.

Effects of mixed AES implementation techniques against Side Channel Analysis (AES 혼합 구현 기법이 부채널 분석에 미치는 영향)

  • Won, Yoo-Seung;Park, Myung-Seo;Lee, Ye-Rim;Han, Dong-Guk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.965-968
    • /
    • 2012
  • 스마트 디바이스 내에 내재된 암호 알고리즘의 이론적인 안전성이 보장되었더라도 연산 수행 시 소모되는 전력소모, 전자기파와 같은 물리적 정보와의 관계를 분석하는 부채널 공격에 대해 취약하다. 이에 대해 부채널 공격의 대표적 대응 기법으로 셔플링 기법과 마스킹 기법이 제안되었다. 특히 셔플링을 활용한 대응 기법은 효율성을 최대한 유지하면서 분석의 난이도를 높이는 기법으로 잘 알려져 왔다. 본 논문에서는 AES 대칭키 암호의 부채널 대응 기법으로 8가지 AES 구현 기법을 셔플링 하여 구현할 경우 부채널 분석에 미치는 영향에 대해 연구하였다. 실험 결과 실제 기대되어지는 분석 난이도는 셔플링을 하지 않은 것에 비해 64배 정도 공격 복잡도가 높아져야 하지만, 실제는 7배정도의 공격 복잡도 증가로 분석이 되었다.

Rituximab Infusion-related Adverse Events and Risk Factors (Rituximab 주입관련 부작용발생 및 위험인자 분석)

  • Lee, Eun Jung;Kim, Young Joo;Rhie, Sandy J
    • Korean Journal of Clinical Pharmacy
    • /
    • v.23 no.3
    • /
    • pp.223-231
    • /
    • 2013
  • Objective: This study aimed to identify the status and risk factors of rituximab infusion-related adverse events (ADE) in rituximab-na$\ddot{i}$ve patients with cancer diseases. Method: A retrospective analysis using electronic medical records review was conducted. Inclusions were patients with a diagnosis of cancer disease with the initiation of rituximab-included treatment who were na$\ddot{i}$ve to rituximab during January 2011 to March 2013 at National Cancer Center (NCC) in Korea. Result: Total 110 patients, 582 cases of rituximab administrations, were reported in the study. About 57.2% of patients were 51-70 years old and evenly distributed between two genders and 72.7% were BMI less than $25kg/m^2$. All of study patients were diagnosed with non-Hodgkin lymphoma. Fifty patients (45.4%) and 54 cases (9.3%) were experienced rituximab infusion-related AEs even with conservative administration protocol at NCC. The most frequently occurring AEs were shivering followed by rash and itching. In single variant analysis, we found that the early stage of NHL, low exposure to rituximab administrations, high white blood cell counts, high lymphocyte counts, high absolute neutrophil count and low lactate dehydrogenase were associated with infusion-related AEs (p<0.05). The early stage of disease, high lymphocyte counts, low exposure to rituximab administrations were also related significantly with AEs in multiple variants analysis (p<0.05). Conclusion: Rituximab infusion-related AEs for patients who were na$\ddot{i}$ve to rituximab were still a concern with conservative administration protocol. The adverse drug reactions were significantly associated with early stage of NHL, higher lymphocyte counts and low exposure to rituximab administrations. The factors need to be considered with close monitoring to prevent rituximab infusion-related AE.

Power Analysis Attack of Block Cipher AES Based on Convolutional Neural Network (블록 암호 AES에 대한 CNN 기반의 전력 분석 공격)

  • Kwon, Hong-Pil;Ha, Jae-Cheol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.5
    • /
    • pp.14-21
    • /
    • 2020
  • In order to provide confidential services between two communicating parties, block data encryption using a symmetric secret key is applied. A power analysis attack on a cryptosystem is a side channel-analysis method that can extract a secret key by measuring the power consumption traces of the crypto device. In this paper, we propose an attack model that can recover the secret key using a power analysis attack based on a deep learning convolutional neural network (CNN) algorithm. Considering that the CNN algorithm is suitable for image analysis, we particularly adopt the recurrence plot (RP) signal processing method, which transforms the one-dimensional power trace into two-dimensional data. As a result of executing the proposed CNN attack model on an XMEGA128 experimental board that implemented the AES-128 encryption algorithm, we recovered the secret key with 22.23% accuracy using raw power consumption traces, and obtained 97.93% accuracy using power traces on which we applied the RP processing method.

Comparison of analytical methods for quantifying total chromium in soil using Atomic Absorption Spectrometer (AAS) and Inductively Coupled Plasma-Atomic Emission Spectrometry (ICP-AES) (토양 시료 중 Atomic Absorption Spectrometry (AAS) 및 Inductively Coupled Plasma-Atomic Emission Spectrometry (ICP-AES)를 이용한 총 크롬 분석방법 비교)

  • Lee, Hong-gil;Kim, Ji-in;Byun, Yoonjoo;Kim, Hyunkoo;Yoon, Jeong Ki
    • Journal of Soil and Groundwater Environment
    • /
    • v.22 no.6
    • /
    • pp.22-28
    • /
    • 2017
  • The accuracy of analytical results in response to the use of different additives ($NH_4Cl$, KCl, $LaCl_3$) and oxidant gases was evaluated and compared by using Atomic Absorption Spectrometry (AAS). Identification of spectroscopic interferences and possible improvements in Inductively Coupled Plasma-Atomic Emission Spectrometry (ICP-AES) analysis were also discussed. The average accuracies of total chromium using Certified Reference Materials (CRMs) were found to be 72.1~94.2% in air/acetylene flame condition by AAS, and they were improved to 100.5~110.5% when the oxidants was changed to nitrous oxide rather than adding the additives. The field samples showed similar trends to CRMs, but chromium concentrations were highly variable depending on analytical conditions. The average accuracies using CRMs were estimated to be 89.3~166.1% by ICP-AES, and improved to below 121.7% after eliminating iron interference. Field samples with low chromium and high iron concentration were measured to be > 30% lower in total chromium concentrations by ICP-AES than AAS in nitrous oxide/acetylene flame. Total chromium concentrations in soil could be analyzed with better accuracy under nitrous oxide/acetylene flame by AAS because it was more effective to increase the temperature of the flame than to eliminate the chemical interference for maximizing atomization of chromium. When using ICP-AES, interference substances, total chromium levels, and analytical conditions should be also considered.

Guided Missile Assembly Test Set using Encryption AES Rijndael Algorithm (암호화 AES Rijndael 알고리즘 적용 유도탄 점검 장비)

  • Jung, Eui-Jae;Koh, Sang-Hoon;Lee, You-Sang;Kim, Young-Sung
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.5
    • /
    • pp.339-344
    • /
    • 2019
  • In order to prepare for the rise of data security threats caused by the information and communication technology, technology that can guarantee the stability of the data stored in the missile test set is important. For this purpose, encryption should be performed when data is stored so that it cannot be restored even if data is leaked, and integrity should be ensured even after decrypting the data. In this paper, we apply AES algorithm, which is a symmetric key cryptography system, to the missile test set, and Encrypt and decrypt according to the amount of data for each bit of each AES algorithm. We implemented the AES Rijndael algorithm in the existing inspection system to analyze the effect of encryption and apply the proposed encryption algorithm to the existing system. confirmation of suitability. analysis of capacity and Algorithm bits it is confirmed that the proposed algorithm will not affect the system operation and the optimal algorithm is derived. compared with the initial data, we can confirm that the algorithm can guarantee data undulation.

Differential Power Analysis for AES and Countermeasure (AES에 대한 차분전력분석공격과 대응책)

  • 김성진;이동욱;이동익
    • Proceedings of the IEEK Conference
    • /
    • 2003.07d
    • /
    • pp.1399-1402
    • /
    • 2003
  • Paul Hocker has developed new attacks based on the electric consumption of cryptographic device such as smartcard that performs cryptographic computation. Among those attacks, the Differential Power Analysis(DPA) is one of the most impressive and most difficult to avoid. By analysing the power dissipation of encryption in a device, the secret information inside can be deduced. This paper presents that Advanced Encryption Standard(AES) is highly vulnerable to DPA and readily leaks away all secret keys through the experimental results for DPA. After all, it is required an implementation of the AES algorithm that is not vulnerable to DPA. We also propose countermeasures that employ asynchronous circuit.

  • PDF

Implementation of AES and ARIA algorithm with Secure Structure for Power Analysis using LFSR Masking

  • Kang, Young-Jin;Kim, Ki-Hwan;Lee, Hoon Jae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.1
    • /
    • pp.79-86
    • /
    • 2020
  • In this paper, we analyzed the case vulnerable to the power analysis attack of the ARIA algorithm and AES algorithm. Through this, we propose an algorithm with a safe structure for power analysis and prove through experiment. The proposed technique is a masking method using LFSR with a cyclic structure. To verify this, 1000, 2000, and 4000 power traces were collected, and the corresponding results are shown and proved. We used ATmega328 Chip for Arduino Uno for the experiment and mounted each algorithm. In order to measure the power consumption, a resistor was inserted and then proceeded. The analysis results show that the proposed structure has a safe structure for power analysis. In the future, we will study ways to lead to performance enhancement.

New Type of Collision Attack on Power-Analysis Resistant AES (전력 분석에 안전한 AES에 대한 새로운 종류의 충돌쌍 공격)

  • Kim, HeeSeok;Park, Hark-Soo;Hong, Seokhie
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.9
    • /
    • pp.393-398
    • /
    • 2013
  • This paper introduces a new collision attack on first-order masked AES. This attack is a known plaintext attack, while the existing collision attacks are a chosen plaintext attack. In addition, our method is more efficient than the second-order power analysis and requires about 1/27.5 power measurements by comparison with the last collision attack. Some experiment results of this paper support this fact. In this paper, we also introduce a simple countermeasure, which can protect against our attack.

Simultaneuous Determination of As(III) and As(V) in Disused Mine Tailing Samples by Hydride Generation-Inductively Coupled Plasma-Atomic Emission Spectrometry (수소화물 발생-유도결합 플라스마 원자 방출 분광법을 이용한 폐광산 광미 시료 중의 As(III)와 As(V)의 동시 정량)

  • Kim, Sun-Tae;Lim, Yoo-Ree;Park, Kyung-Su;Chung, Jin-Ho
    • Analytical Science and Technology
    • /
    • v.13 no.2
    • /
    • pp.189-193
    • /
    • 2000
  • Arsenic (III) and arsenic (V) in disused mine tailing samples have been determined simutaneuously by hydride generation inductively coupled plasma atomic emission spectrometry (HG-ICP-AES). Total arsenic was determined using 2% $NaBH_4$ and 6 M HCl after prereduction of As(V) to As(III) with) 1M KI. Arsenic (III) was determined selectively using citrate/citric acid buffer with range of pH 5-6, it was determined by HG-ICP-AES. Arsenic (V) can be evaluated by the differences. According to the results, arsenic (V) was over 90% among the total arsenic extracted from disused mine tailing samples.

  • PDF