• Title/Summary/Keyword: Power Analysis Attack

Search Result 215, Processing Time 0.018 seconds

Multi-Round CPA on Hardware DES Implementation (하드웨어 DES에 적용한 다중라운드 CPA 분석)

  • Kim, Min-Ku;Han, Dong-Guk;Yi, Ok-Yeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.3
    • /
    • pp.74-80
    • /
    • 2012
  • Recently at SCIS2011, Nakatsu et. al. proposed multi-round Correlation Power Analysis(CPA) on Hardware Advanced Encryption Standard(AES) to improve the performance of CPA with limited number of traces. In this paper, we propose, Multi-Round CPA to retrieve master key using CPA of 1round and 2round on Hardware DES. From the simulation result for the proposed attack method, we could extract 56-bit master key using the 300 power traces of Hardware DES in DPA contes. And it was proved that we can search more master key using multi-round CPA than using single round CPA in limited environments.

Mutual Information Analysis for Three-Phase Dynamic Current Mode Logic against Side-Channel Attack

  • Kim, Hyunmin;Han, Dong-Guk;Hong, Seokhie
    • ETRI Journal
    • /
    • v.37 no.3
    • /
    • pp.584-594
    • /
    • 2015
  • To date, many different kinds of logic styles for hardware countermeasures have been developed; for example, SABL, TDPL, and DyCML. Current mode-based logic styles are useful as they consume less power compared to voltage mode-based logic styles such as SABL and TDPL. Although we developed TPDyCML in 2012 and presented it at the WISA 2012 conference, we have further optimized it in this paper using a binary decision diagram algorithm and confirmed its properties through a practical implementation of the AES S-box. In this paper, we will explain the outcome of HSPICE simulations, which included correlation power attacks, on AES S-boxes configured using a compact NMOS tree constructed from either SABL, CMOS, TDPL, DyCML, or TPDyCML. In addition, to compare the performance of each logic style in greater detail, we will carry out a mutual information analysis (MIA). Our results confirm that our logic style has good properties as a hardware countermeasure and 15% less information leakage than those secure logic styles used in our MIA.

Performance Analysis of Stabilizer Fin Applied Coanda System (코안다 시스템이 장착된 안정기용 핀의 성능해석)

  • Seo, Dae-Won;Lee, Se-Jin;Oh, Jungkeun
    • Journal of Ocean Engineering and Technology
    • /
    • v.30 no.1
    • /
    • pp.18-24
    • /
    • 2016
  • Stabilizer fins are installed on each side of a ship to control its roll motion. The most common stabilizer fin is a rolling control system that uses the lift force on the fin surface. If the angle of attack of a stabilizer fin is zero or the speed is zero, it cannot control the roll motion. The Coanda effect is well known to generate lift force in marine field. The performance of stabilizer fin that applies the Coanda effect has been verified by model tests and numerical simulations. It was found that a stabilizer fin that applied the Coanda effect at Cj = 0.085 and a zero angle of attack exactly coincided with that of the original fin at α = 26°. In addition, the power needed to generate the Coanda effect was not high compared to the motor power of the original stabilizer fin.

A Study on Flow Characteristics of a Wells Turbine for Wave Power Conversion Using Numerical Analysis (수치해석을 이용한 파력발전용 웰즈터빈의 유동특성에 관한 연구)

  • ;;;;T.Setoguchi
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.25 no.1
    • /
    • pp.182-190
    • /
    • 2001
  • The aerodynamics of the Wells turbine has been studied using 3-d, unstructured mesh flow solver for the Reynolds-averaged Navier-Stokes equations. The basic feature of the Wells turbine is that even though the cyclic airflow produces oscillating axial forces on the airfoil blades, the tangential force on the rotor is always in the same direction. Geometry used to define 3-D numerical grid is based upon that of an experimental test rig. The 3-D Wells turbine model, consisting of approximate 220,000 cells is tested of four axial flow rates. In the calculations the angle of attack has been varied between 10˚ and 30˚ of blades, Representative results from each case are presented graphically andy analysed. It is concluded that this technique holds much promise for future development of Wells turbines.

  • PDF

Numerical Analysis of Flow Characteristics in the Wells Turbine for Wave Power Conversion (파력 발전용 웰즈터빈의 유동특성에 관한 수치적 연구)

  • Lee, Hyeong-Gu;Kim, Jeong-Hwan;Lee, Yeon-Won
    • 유체기계공업학회:학술대회논문집
    • /
    • 2000.12a
    • /
    • pp.325-333
    • /
    • 2000
  • The aerodynamics of the Wells turbine has been studied using a 3-dimensional, unstructured mesh flow solver for the Reynolds-averaged Navier-Stokes equations. The basic feature of the Wells turbine is that even though the cyclic airflow produces oscillating axial forces on the airfoil blades, the tangential force on the rotor is always in the same direction. Geometry used to define the 3-dimensional numerical grid is based upon that of an experimental test rig. The 3-dimensional Wells turbine model, consisting of approximate 220,000 cells is tested at four axial flow rates. In the calculations the angle of attack has been varied between $10^{\circ}$ and $30^{\circ}$ of blades. Representative results from each case are presented graphically and analyzed. It is concluded that this method holds much promise for future development of Wells turbines.

  • PDF

Power analysis attack resilient block cipher implementation based on 1-of-4 data encoding

  • Shanmugham, Shanthi Rekha;Paramasivam, Saravanan
    • ETRI Journal
    • /
    • v.43 no.4
    • /
    • pp.746-757
    • /
    • 2021
  • Side-channel attacks pose an inevitable challenge to the implementation of cryptographic algorithms, and it is important to mitigate them. This work identifies a novel data encoding technique based on 1-of-4 codes to resist differential power analysis attacks, which is the most investigated category of side-channel attacks. The four code words of the 1-of-4 codes, namely (0001, 0010, 1000, and 0100), are split into two sets: set-0 and set-1. Using a select signal, the data processed in hardware is switched between the two encoding sets alternately such that the Hamming weight and Hamming distance are equalized. As a case study, the proposed technique is validated for the NIST standard AES-128 cipher. The proposed technique resists differential power analysis performed using statistical methods, namely correlation, mutual information, difference of means, and Welch's t-test based on the Hamming weight and distance models. The experimental results show that the proposed countermeasure has an area overhead of 2.3× with no performance degradation comparatively.

A novel power trace aligning method for power analysis attacks in mobile devices (모바일 기기에서의 전력 분석 공격을 위한 새로운 전력 신호 정렬 방법)

  • Lee, Yu-Ri;Kim, Wan-Jin;Lee, Young-Jun;Kim, Hyoung-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.153-166
    • /
    • 2011
  • Recent trends in mobile device market whose services are rapidly expanding to provide wireless internet access are drawing people's attention to mobile security. Especially, since threats to information leakage are reaching to the critical level due to the frequent interchange of important data such as personal and financial information through wireless internet, various encryption algorithms has been developed to protect them. The encryption algorithms confront the serious threats by the appearance of side channel attack (SCA) which uses the physical leakage information such as timing, and power consumption, though the their robustness to threats is theoretically verified. Against the threats of SCA, researches including the performance and development direction of SCA should precede. Among tile SCA methods, the power analysis (PA) attack overcome this misalignment problem. The conventional methods require large computational power and they do not effectively deal with the delay changes in a power trace. To overcome the limitation of the conventional methods, we proposed a novel alignment method using peak matching. By computer simulations, we show the advantages of the proposed method compared to the conventional alignment methods.

Computational Flow Analysis and Drag Coefficient Research for Angle of Attack in Slocum Underwater Glider (Slocum 수중 글라이더의 유영 받음각에 대한 전산유동해석 및 항력계수 연구)

  • Park, Jeong-Woo;Lee, Jung-Woo;Choi, Young-Ho;Seo, Kap-Ho;Suh, Jin-Ho;Park, Jong-Jin
    • Journal of Ocean Engineering and Technology
    • /
    • v.30 no.5
    • /
    • pp.381-388
    • /
    • 2016
  • An underwater glider makes it easy to explore a wide area with low power. However, an underwater glider is difficult to use for rapid collection, because the surfacing location cannot be predicted after a dive. Thus, simulation research is needed to predict the swimming path. In this paper, based on research, a linearized equation is derived for the drag coefficient at each angle of attack by assuming the boundary conditions for the Slocum underwater glider and performing a computational flow analysis.

Key Bit-dependent Attack on Side-Channel Analysis-Resistant Hardware Binary Scalar Multiplication Algorithm using a Single-Trace (부채널 분석에 안전한 하드웨어 이진 스칼라 곱셈 알고리즘에 대한 단일 파형 비밀 키 비트 종속 공격)

  • Sim, Bo-Yeon;Kang, Junki;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1079-1087
    • /
    • 2018
  • Binary scalar multiplication which is the main operation of elliptic curve cryptography is vulnerable to the side-channel analysis. Especially, it is vulnerable to the side-channel analysis which uses power consumption and electromagnetic emission patterns. Thus, various countermeasures have been studied. However, they have focused on eliminating patterns of data dependent branches, statistical characteristic according to intermediate values, or the interrelationships between data. No countermeasure have been taken into account for the secure design of the key bit check phase, although the secret scalar bits are directly loaded during that phase. Therefore, in this paper, we demonstrate that we can extract secret scalar bits with 100% success rate using a single power or a single electromagnetic trace by performing key bit-dependent attack on hardware implementation of binary scalar multiplication algorithm. Experiments are focused on the $Montgomery-L{\acute{o}}pez-Dahab$ ladder algorithm protected by scalar randomization. Our attack does not require sophisticated pre-processing and can defeat existing countermeasures using a single-trace. As a result, we propose a countermeasure and suggest that it should be applied.

Symmetric Adiabatic Logic Circuits against Differential Power Analysis

  • Choi, Byong-Deok;Kim, Kyung-Eun;Chung, Ki-Seok;Kim, Dong-Kyue
    • ETRI Journal
    • /
    • v.32 no.1
    • /
    • pp.166-168
    • /
    • 2010
  • We investigate the possibility of using adiabatic logic as a countermeasure against differential power analysis (DPA) style attacks to make use of its energy efficiency. Like other dual-rail logics, adiabatic logic exhibits a current dependence on input data, which makes the system vulnerable to DPA. To resolve this issue, we propose a symmetric adiabatic logic in which the discharge paths are symmetric for data-independent parasitic capacitance, and the charges are shared between the output nodes and between the internal nodes, respectively, to prevent the circuit from depending on the previous input data.