• Title/Summary/Keyword: Security-channel

Search Result 611, Processing Time 0.023 seconds

Differential Power Analysis on Countermeasures Using Binary Signed Digit Representations

  • Kim, Tae-Hyun;Han, Dong-Guk;Okeya, Katsuyuki;Lim, Jong-In
    • ETRI Journal
    • /
    • v.29 no.5
    • /
    • pp.619-632
    • /
    • 2007
  • Side channel attacks are a very serious menace to embedded devices with cryptographic applications. To counteract such attacks many randomization techniques have been proposed. One efficient technique in elliptic curve cryptosystems randomizes addition chains with binary signed digit (BSD) representations of the secret key. However, when such countermeasures have been used alone, most of them have been broken by various simple power analysis attacks. In this paper, we consider combinations which can enhance the security of countermeasures using BSD representations by adding additional countermeasures. First, we propose several ways the improved countermeasures based on BSD representations can be attacked. In an actual statistical power analysis attack, the number of samples plays an important role. Therefore, we estimate the number of samples needed in the proposed attack.

  • PDF

RFID backward channel protection scheme by Partial Encryption scheme based on SEED (SEED 기반의 부분 암호화 기법을 이용한 RFID 백워드 채널 보호 기법)

  • Kim, Sung-Jin;Park, Seok-Cheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.1
    • /
    • pp.215-222
    • /
    • 2008
  • In this paper, we analyse eavesdrop problem of existing RFID security scheme and proposed improved SEEB algorithm for RFID security. we suggest partial round process and security in SEED algorithm. Existing scheme has vulnerability of security and implementation so far from realization. Therefore In our paper, we proposed new scheme using modified SEED algorithm for backward channel protection.

Analysis of transmission performance of communication security bit synchronization Information in VMF system (가변메시지형식체계에서 COMSEC 비트동기 정보의 전송영향 분석)

  • Hong, Jin-Keun;Park, Sun-Chun;Kim, Ki-Hong;Kim, Seong-Jo;Park, Jong-Wook
    • Proceedings of the KIEE Conference
    • /
    • 2005.05a
    • /
    • pp.272-274
    • /
    • 2005
  • In this paper, we analyses transmission performance of communication security(COMSEC) bit synchronization information over the single channel found and airborne radion system in variable message format system. Experimental results demonstrate the robust characteristics of the COMSEC bit synchronization information in $10^{-1}\sim10^{-5}$ of bit error channel and the relationship of time duration of bit synchronization and probability of synchronization detection.

  • PDF

Analysis of Transmission Performance of Communication Security Bit Synchronization Information in VMF System (가변메시지형식체계에서 통신보안을 위한 비트동기 정보의 전송영향 분석)

  • Park Youngmi;Son Youngho;Yoon Janghong;Hong Jinkeun
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.54 no.7
    • /
    • pp.443-446
    • /
    • 2005
  • In this paper, we analyses transmission performance of communication security(COMSEC) bit synchronization information over the single channel ground and airborne radion system in variable message format system. Experimental results demonstrate the robust characteristics of the COMSEC bit synchronization information in 10-1 $\~$ 10-5 of bit error channel and the relationship of time duration of bit synchronization and probability of synchronization detection.

Side-Channel Attacks on AES Based on Meet-in-the-Middle Technique (중간 일치 분석법에 기반한 AES에 대한 부채널 공격)

  • Kim, Jong-Sung;Hong, Seok-Hie;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.3-9
    • /
    • 2009
  • In this paper we introduce a new side-channel attack using block cipher cryptanalysis named meet-in-the middle attack. Using our new side-channel technique we introduce side-channel attacks on AES with reduced masked rounds. That is, we show that AES with reduced 10 masked rounds is vulnerable to side channel attacks based on an existing 4-round function. This shows that one has to mask the entire rounds of the 12-round 192-bit key AES to prevent our attacks. Our results are the first ones to analyze AES with reduced 10 masked rounds.

Channel Transfer Function estimation based on Delay and Doppler Profiler for 5G System Receiver targeting 500km/h linear motor car

  • Suguru Kuniyoshi;Shiho Oshiro;Gennan Hayashi;Tomohisa Wada
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.121-127
    • /
    • 2023
  • A 500 km/h linear motor high speed terrestrial transportation service is planned to launch 2027 in Japan. In order to support 5G service in the train, the Sub-carrier spacing frequency of 30 kHz is planned to be used instead of common 15 kHz sub-carrier spacing to mitigate Doppler effect in such high-speed transportation. In addition, to increase the cell size of 5G mobile system, plural Base Station antenna will transmit the identical Down Link (DL) signal to form the expanded cell size along the train rail. In this situation, forward and backward antenna signals will be Doppler shifted by reverse direction respectively and the receiver in the train might suffer to estimate accurate Channel Transfer Function (CTF) for its demodulation. In this paper, Delay and Doppler Profiler (DDP) based Channel Estimator is proposed and it is successfully implemented in signal processing simulation system. Then the simulated performances are compared with the conventional Time domain linear interpolated estimator. According to the simulation results, QPSK modulation can be used even under severe channel condition such as 500 km/h, 2 path reverse Doppler Shift condition, although QPSK modulation can be used less than 200 km/h with conventional Channel estimator.

SDR Based Modulation Performance of RF Signal under Different Communication Channel

  • Shabana Habib
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.182-188
    • /
    • 2024
  • Hardware components are an integral part of Hardware Define Radio (HDR) for seamless operations and optimal performance. On the other hand, Software Define Radio (SDR) is a program that does not rely on any hardware components for its performance. Both of the latter radio programmers utilize modulation functions to make their core components from signal processing viewpoint. The following paper concentrates on SDR based modulation and their performance under different modulations. The bit error rate (BER) of modulations such as PSK, QAM, and PSAM were used as indicators to test channel quality estimation in planar Rayleigh fading. Though it is not commonly used for channel fading, the method of the adder determines the regionally segmented channel fading. Thus, the estimation error of the channel change substantially reduces the performance of the signal, hence, proving to be an effective option. Moreover, this paper also elaborates that BER is calculated as a function of the sample size (signal length) with an average of 20 decibels. Consequently, the size of the results for different modulation schemes has been explored. The analytical results through derivations have been verified through computer simulation. The results focused on parameters of amplitude estimation error for 1dB reduction in the average signal-to-noise ratio, while the combined amplitude deviation estimation error results are obtained for a 3.5 dB reduction

Side-Channel Attacks on Square Always Exponentiation Algorithm (Square Always 멱승 알고리듬에 대한 부채널 공격)

  • Jung, Seung-Gyo;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.477-489
    • /
    • 2014
  • Based on some flaws occurred for implementing a public key cryptosystem in the embedded security device, many side-channel attacks to extract the secret private key have been tried. In spite of the fact that the cryptographic exponentiation is basically composed of a sequence of multiplications and squarings, a new Square Always exponentiation algorithm was recently presented as a countermeasure against side-channel attacks based on trading multiplications for squarings. In this paper, we propose Known Power Collision Analysis and modified Doubling attacks to break the Right-to-Left Square Always exponentiation algorithm which is known resistant to the existing side-channel attacks. And we also present a Collision-based Combined Attack which is a combinational method of fault attack and power collision analysis. Furthermore, we verify that the Square Always algorithm is vulnerable to the proposed side-channel attacks using computer simulation.

Differential Fault Analysis on Block Cipher ARIA-128 (블록 암호 ARIA-128에 대한 차분 오류 공격)

  • Park, Se-Hyun;Jeong, Ki-Tae;Lee, Yu-Seop;Sung, Jae-Chul;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.15-25
    • /
    • 2011
  • A differential fault analysis(DFA) is one of the most important side channel attacks on block ciphers. Most block ciphers, such as DES, AES, ARIA, SEED and so on., have been analysed by this attack. In 2008, Wei et al. proposed the first DFA on ARIA-128. Their attack can recover the 128-bit secrey key by about 45 faulty ciphertexts. In this paper, we propose an improved DFA on ARIA-128. We can recover the 12S-bit secret key by only 4 faulty ciphertexts with the computational complexity of O($2^{32}$).

Side-Channel Attack of Android Pattern Screen Lock Exploiting Cache-Coherent Interface in ARM Processors (ARM 캐시 일관성 인터페이스를 이용한 안드로이드 OS의 스크린 잠금 기능 부채널 공격)

  • Kim, Youngpil;Lee, Kyungwoon;Yoo, Seehwan;Yoo, Chuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.227-242
    • /
    • 2022
  • This paper presents a Cache-Coherency Interconnect(CCI)-based Android pattern screen lock(PSL) attack on modern ARM processors. CCI has been introduced to maintain the cache coherency between the big core cluster and the little core cluster. That is, CCI is the central interconnect inside SoC that maintains cache coherency and shares data. In this paper, we reveal that CCI can be a side channel in security, that an adversary can observe security-sensitive operations. We design and implement a technique to compromise Android PSL within only a few attempts using the information of CCI in user-level applications on Android Nougat. Further, we analyzed the relationship between the pattern complexity and security. Our evaluation results show that complex and simple patterns would have similar security strengths against the proposed technique.