• Title/Summary/Keyword: C2 attack

Search Result 359, Processing Time 0.026 seconds

Key-dependent side-channel cube attack on CRAFT

  • Pang, Kok-An;Abdul-Latip, Shekh Faisal
    • ETRI Journal
    • /
    • v.43 no.2
    • /
    • pp.344-356
    • /
    • 2021
  • CRAFT is a tweakable block cipher introduced in 2019 that aims to provide strong protection against differential fault analysis. In this paper, we show that CRAFT is vulnerable to side-channel cube attacks. We apply side-channel cube attacks to CRAFT with the Hamming weight leakage assumption. We found that the first half of the secret key can be recovered from the Hamming weight leakage after the first round. Next, using the recovered key bits, we continue our attack to recover the second half of the secret key. We show that the set of equations that are solvable varies depending on the value of the key bits. Our result shows that 99.90% of the key space can be fully recovered within a practical time.

A Security Analysis of PMAC and TMAC variant (PMAC과 TMAC 변이 알고리즘에 대한 안전성 고찰)

  • 이창훈;김종성;이상진
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.4
    • /
    • pp.91-96
    • /
    • 2004
  • In this paper, we introduce two forgery attacks on the PMAC. If it has no truncation then the attack requires about $2^{n}$ 2+1/ chosen texts, otherwise, the attack requires about $2^{n}$ 2+1/ chosen texts and $2^{n-}$$\tau$ MAC verifications where $\tau$ is the size of the MAC. We also give a forgery attack on the TMAC variant which requires about $2^{n}$ 2+1/ texts.

Sulfate Attack and Its Deterioration Modes (황산염 침식과 성능저하 모드)

  • Lee, Seung-Tae;Moon, Han-Young;Kim, Seong-Soo;Lee, Chang-Soo;Kim, Jong-Pil;Hooton, R.D.
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2006.05b
    • /
    • pp.209-212
    • /
    • 2006
  • Until now, sulfate attack is not completely understood. The purpose of this study is to provide a fundamental data to understand deterioration mechanism by sulfate attack. Chemical processes for products formed by sulfate attack were explained in this study. ASTM C1012 test and microstructural observations such as XRD and BSE analysis were carried out to manifest behavior and role of the products formed during sulfate attack. Regarding the dominant causes of sulfate attack, the main deterioration modes could be divided into 3 types; (1) expansive type, (2) onion-peeling type, and (3) acidic type.

  • PDF

Numerical Analysis of Flow Characteristics around 3D Supersonic Inlet at Various Angle of Attack (받음각이 있는 3차원 초음속 흡입구 주위의 유동진동 해석)

  • Kim, J.;Hong, W.;Kim, C.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2011.05a
    • /
    • pp.218-224
    • /
    • 2011
  • A supersonic inlet at angle of attack has anti-symmetric pressure distribution, and it can make flow instability and structural problem. In this study, numerical analysis of three-dimensional inviscid flow was conducted under various throttle ratio and angle of attack conditions. Throttle ratio was defined as the ratio of the exit area to the smallest cross section area at inlet, and the ratio is controlled from 0 to 2.42. At various angle of attack, the characteristics of steady and unsteady flow around supersonic inlet is observed under different throttling ratios. From these results, pressure recovery curves and pressure history curves were plotted by post processing. Using pressure history data, FFT analysis is also carried out. Through these processes, it shows the tendency of pressure distribution anti-symmetricity and changing dominant frequency as increasing angle of attack.

  • PDF

The Related-Key Attack on Grain-v1 (스트림 암호 Grain-v1에 대한 연관키 공격)

  • Lee, Yu-Seop;Jung, Ki-Tae;Sung, Jae-Chul;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.45-52
    • /
    • 2008
  • The slide resynchronization attack on Grain-v1 was proposed in [5]. Given the keystream sequence, this attack can generate the 1-bit shifted keystream sequence generated by Grain-v1. In this paper, extending the attack proposed in [5], we propose the key recovery attack on Grain-v1 using the related-key. Using the weakness of the initialization procedure of Grain-v1, this attack recover the master key with $2^{25.02}$ Ⅳs and $2^{56}$ time complexity. This attack is the first known key recovery attack on Grain-v1.

Kinetics and Mechanism of the Anilinolysis of Diethyl Thiophosphinic Chloride in Acetonitrile

  • Hoque, Md. Ehtesham Ul;Lee, Hai-Whang
    • Bulletin of the Korean Chemical Society
    • /
    • v.32 no.7
    • /
    • pp.2306-2310
    • /
    • 2011
  • The nucleophilic substitution reactions of diethyl thiophosphinic chloride with substituted anilines ($XC_6H_4NH_2$) and deuterated anilines ($XC_6H_4ND_2$) are investigated kinetically in acetonitrile at 55.0 $^{\circ}C$. The values of deuterium kinetic isotope effects (DKIEs; $k_H/k_D$) invariably increase from secondary inverse ($k_H/k_D$ < 1) to primary normal (kH/kD > 1) as the nucleophiles change from the strongly basic to weakly basic anilines. The secondary inverse with the strongly basic anilines and primary normal DKIEs with the weakly basic anilines are rationalized by the gradual transition state (TS) variation from a predominant backside attack, via invariably increasing the fraction of a frontside attack, to a predominant frontside attack, in which the reaction mechanism is a concerted $S_N2$ pathway. A frontside attack involving a hydrogen bonded, four-center-type TS is substantiated by the primary normal DKIEs.

A Comparative Study between First Attack and Reattack Groups in C.V.A (중풍환자의 초발군과 재발군에 관한 임상적 고찰)

  • 박숙자;권정남;김영균
    • The Journal of Korean Medicine
    • /
    • v.23 no.3
    • /
    • pp.119-133
    • /
    • 2002
  • Objectives : This study was designed to investigate significant differences between the first attack and reattack groups to form fundamental data for decreasing recurrence and secondary prevention of stroke. Methods : I studied 204 patients admitted within 7 days of onset, after the diagnosis of stroke, in the Oriental Medical Hospital of Dongeui University from February to July in 2001.compared the reattack group with the first attack group for risk factors, clinical symptoms and progress, average mark and degree of improvement in Activity Index. Results : 1. Meaningful risk factors associated with the reattack group were male sex, a past history of hypertension and transient ischemic attack, and a family history of stroke. 2. The reattack group had conscious or cognitive disorder in early stage of onset, dysphagia, constipation, urinary incontinence, visual field defect in acute stage, high blood pressure and tachycardia in abnormalvital sign in acute stage, neuropsychosis, shoulder pain and rigidity, and pneumonia in complications more than the first attack group. 3. In Activity Index, the average mark of reattack group was lower than that of the first stroke group and improvement of the reattack group was delayed compared with the first attack group. Conclusions : The reattack group had more severe symptoms and clinical progress than the first attack group.

  • PDF

A Light-weight PKM Mutual Authentication Protocol for Improving Initial Authentication in WiMAX (WiMAX 초기 인증을 향상시킨 경량화된 PKM 상호 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.257-266
    • /
    • 2009
  • Now a days, as increased the use of mobile units like a laptop computer and PDA, the demand for high speed internet service is increasing. On the other hand, PKMv2 which is provided from IEEE 802.16e cannot support fully on the security of high speed internet service. This paper proposes light-weight mutual authentication protocol which solved security problem of PKMv2 related to integrity of mobile node for transmission of safe high speed data of mobile node operating in mobile WiMAX environment. Proposed mutual authentication protocol increases the efficiency as the user in network can move in network safely without additional procedure of authentication between subscriber and base station after user's initial authentication. Also, the proposed mutual authentication protocol is safe from the security attack (the man-in-the-middle attack and reply attack) between subscriber and base station by generating a key adopt to PRF() function using random number and secret value in order to secure certification.

A Basic Study on the Selection of Required Operational Capability for Attack Drones of Army TIGER Units Using AHP Technique (AHP 기법을 이용한 Army TIGER 부대 공격용 드론의 작전요구성능 선정에 관한 기초 연구)

  • Jinho Lee;Seongjin Kwon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.26 no.2
    • /
    • pp.197-204
    • /
    • 2023
  • The importance of each warfighting function for Army TIGER unit attack drones is measured using the AHP technique. As a result, the importance of attack drones is high in the order of maneuver, firepower, intelligence, command/control, protection, and operation sustainment, but the importance of maneuver, firepower, and intelligence are almost similar. In addition, it is analyzed that attack drones capable of carrying out day and night missions by being equipped with an EO/IR sensor and being commanded/controlled in conjunction with the C4I system to eliminate threats with small bombs or aircraft collisions is needed. Finally, based on the results of this study, a virtual battle scenario for attack drones is proposed.

Full-scale study of conical vortices and roof corner pressures

  • Wu, F.;Sarkar, P.P.;Mehta, K.C.
    • Wind and Structures
    • /
    • v.4 no.2
    • /
    • pp.131-146
    • /
    • 2001
  • A full-scale synchronized data acquisition system was set up on the roof of the experimental building at the Texas Tech University Wind Engineering Research Field Laboratory to simultaneously collect approaching wind data, conical vortex images, and roof corner suction pressure data. One-second conditional sampling technique has been applied in the data analysis, which makes it possible to separately evaluate the influencing effects of the horizontal wind angle of attack, ${\theta}$, and the vertical wind angle of attack, ${\varphi}$. Results show a clear cause-and-effect relationship between the incident wind, conical vortices, and the induced roof-corner high-suction pressures. The horizontal wind angle of attack, ${\theta}$, is shown to be the most significant factor in influencing the overall vortex structure and the suction pressures beneath. It is further revealed that the vertical wind angle of attack, ${\varphi}$, plays a critical role in generating the instantaneous peak suction pressures near the roof corner.