• Title/Summary/Keyword: Side Channel

Search Result 924, Processing Time 0.029 seconds

Differential Power Analysis on Countermeasures Using Binary Signed Digit Representations

  • Kim, Tae-Hyun;Han, Dong-Guk;Okeya, Katsuyuki;Lim, Jong-In
    • ETRI Journal
    • /
    • v.29 no.5
    • /
    • pp.619-632
    • /
    • 2007
  • Side channel attacks are a very serious menace to embedded devices with cryptographic applications. To counteract such attacks many randomization techniques have been proposed. One efficient technique in elliptic curve cryptosystems randomizes addition chains with binary signed digit (BSD) representations of the secret key. However, when such countermeasures have been used alone, most of them have been broken by various simple power analysis attacks. In this paper, we consider combinations which can enhance the security of countermeasures using BSD representations by adding additional countermeasures. First, we propose several ways the improved countermeasures based on BSD representations can be attacked. In an actual statistical power analysis attack, the number of samples plays an important role. Therefore, we estimate the number of samples needed in the proposed attack.

  • PDF

A Study on Side-channel Analysis for Smartphone USIM (스마트폰 USIM 부채널 분석 방법에 대한 연구)

  • Kwon, Keun;Jung, Jaewook;Won, Dongho
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2012.07a
    • /
    • pp.389-392
    • /
    • 2012
  • 스마트폰의 USIM은 사용자가 별도로 인증정보를 입력할 필요가 없는 매우 편리한 인증 방법을 제공한다. 그러나 USIM에 저장된 정보가 외부로 유출될 경우 공격자가 손쉽게 정당한 사용자로 위장할 수 있는 문제점이 있다. 특히 USIM은 스마트카드에서 실행되는 어플리케이션이므로 기존에 스마트카드에 적용되었던 부채널 분석 공격 기법들이 USIM에도 적용 가능할 것으로 예상된다. 이에 본 논문에서는 스마트폰 USIM에 대한 부채널 분석 공격 가능성에 대해서 분석하고 스마트폰 USIM에 적용될 수 있는 부채널 분석 환경을 제안한다.

  • PDF

Spatial Multiplexing Receivers in UWB MIMO Systems based on Prerake Combining

  • An, Jin-Young;Kim, Sang-Choon
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.4
    • /
    • pp.385-390
    • /
    • 2011
  • In this paper, various ultra-wideband (UWB) spatial multiplxing (SM) multiple input multiple output (MIMO) receivers based on a prerake diversity combining scheme are discussed and their performance is analyzed. Several UWB MIMO detection approaches such as zero forcing (ZF), minimum mean square error (MMSE), ordered successive interference cancellation (OSIC), sorted QR decomposition (SQRD), and maximum likelihood (ML) are considered in order to cope with inter-channel interference. The UWB SM systems based on transmitter-side multipath preprocessing and receiver-side MIMO detection can either boost the transmission data rate or offer significant diversity gain and improved BER performance. The error performance and complexity of linear and nonlinear detection algorithms are comparatively studied on a lognormal multipath fading channel.

Experimental Environment Analysis for Power Analysis Attacks (전력분석공격에 대한 실험환경 분석)

  • Kang, Young Jin;Lee, Hoon Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.390-393
    • /
    • 2014
  • The importance of this emerging information security and u-Korea or ubiquitous IT era, and the information security is more important. Especially, the small core device password encryption algorithm is an important part of the secure side channel attack cryptographic algorithms. However, it can provide high level of security, an adversary can attack small core device through implementation of cryptographic algorithms. In this paper describes for the Power Analysis attack and analyze the experimental environment.

  • PDF

Power analysis attack resilient block cipher implementation based on 1-of-4 data encoding

  • Shanmugham, Shanthi Rekha;Paramasivam, Saravanan
    • ETRI Journal
    • /
    • v.43 no.4
    • /
    • pp.746-757
    • /
    • 2021
  • Side-channel attacks pose an inevitable challenge to the implementation of cryptographic algorithms, and it is important to mitigate them. This work identifies a novel data encoding technique based on 1-of-4 codes to resist differential power analysis attacks, which is the most investigated category of side-channel attacks. The four code words of the 1-of-4 codes, namely (0001, 0010, 1000, and 0100), are split into two sets: set-0 and set-1. Using a select signal, the data processed in hardware is switched between the two encoding sets alternately such that the Hamming weight and Hamming distance are equalized. As a case study, the proposed technique is validated for the NIST standard AES-128 cipher. The proposed technique resists differential power analysis performed using statistical methods, namely correlation, mutual information, difference of means, and Welch's t-test based on the Hamming weight and distance models. The experimental results show that the proposed countermeasure has an area overhead of 2.3× with no performance degradation comparatively.

Maximal overlap discrete wavelet transform-based power trace alignment algorithm against random delay countermeasure

  • Paramasivam, Saravanan;PL, Srividhyaa Alamelu;Sathyamoorthi, Prashanth
    • ETRI Journal
    • /
    • v.44 no.3
    • /
    • pp.512-523
    • /
    • 2022
  • Random delay countermeasures introduce random delays into the execution flow to break the synchronization and increase the complexity of the side channel attack. A novel method for attacking devices with random delay countermeasures has been proposed by using a maximal overlap discrete wavelet transform (MODWT)-based power trace alignment algorithm. Firstly, the random delay in the power traces is sensitized using MODWT to the captured power traces. Secondly, it is detected using the proposed random delay detection algorithm. Thirdly, random delays are removed by circular shifting in the wavelet domain, and finally, the power analysis attack is successfully mounted in the wavelet domain. Experimental validation of the proposed method with the National Institute of Standards and Technology certified Advanced Encryption Standard-128 cryptographic algorithm and the SAKURA-G platform showed a 7.5× reduction in measurements to disclosure and a 3.14× improvement in maximum correlation value when compared with similar works in the literature.

Improved Side Channel Attack using Restricted Number of Traces on RSA-CRT (제한된 파형을 이용한 향상된 RSA-CRT 부채널 분석)

  • Park, Jong-Yeon;Han, Dong-Guk;Yi, Ok-Yeon;Choi, Doo-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.1016-1019
    • /
    • 2011
  • RSA-CRT 알고리즘은 RSA 의 지수승 연산의 효율성을 향상시키기 위해 널리 사용되고 있으며, CRT 를 적용한 알고리즘은 다양한 방법의 부채널 분석(Side Channel Analysis)으로부터 약점이 노출되어 왔다. 그 중 Boer 등에 의해 발표된 MRED 분석 방법은, 등 간격의 데이터(Equidistant Data)를 이용하여 CRT 의 모듈러 리덕션 연산(Modular Reduction)결과로부터의 약점을 활용하여 일반적인 DPA 분석 법을 적용시킨 방법이다. 우리는 리덕션 결과의 데이터에 의존한 분석에서 벗어나, 리덕션 알고리즘 중간 연산 과정을 공격하는 새로운 공격 방법을 개발하였으며, 새로운 공격은 오직 "$256{\times}n$개"의 파형만으로 키 공간을 상당히 줄일 수 있기 때문에, 제한된 평문 수에서 이전에 알려져 있던 일반적인 MRED 분석 방법보다 향상된 분석 성능을 제공한다. 본 논문은 리더션 연산과정을 이용한 새로운 전력 분석 방법을 실제 MCU Chip 을 이용한 분석 결과를 제안한다.

Effect of Attachment of Buoyant Jet to Shoreline Pollution in a Confined Crossflow (가로흐름 수역에 방류되는 부력젵의 귀환에 의한 연안오염)

  • Yoon, Tae-Hoon;Yook, Woon-Soo
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.6 no.1
    • /
    • pp.34-39
    • /
    • 1994
  • The dilution and the shore attachment of buoyant effluent into a crossflow are investigated experimentally. The effluent is produced by discharging warm water through a side channel into an open channel crossflow with the same depth to the side channel flow. Buoyancy causes the effluent to lift off the bottom, spreads across the crossflow and stays as the surface layer. The geometry of the recirculating region and the dilution of the effluent depend mainly on the buoyancy. The condition of the shore attachment can be specified by the ratios of velocities and Froude numbers.

  • PDF

A Load Identification Method for ICPT System Utilizing Harmonics

  • Xia, Chen-Yang;Zhu, Wen-Ting;Ma, Nian;Jia, Ren-Hai;Yu, Qiang
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.6
    • /
    • pp.2178-2186
    • /
    • 2018
  • Online identification of load parameters is the premise of establishing a stable and highly-efficient ICPT (Inductive Coupled Power Transfer) system. However, compared with pure resistive load, precise identification of composite load, such as resistor-inductance load and resistance-capacitance load, is more difficult. This paper proposes a method for detecting the composite load parameters of ICPT system utilizing harmonics. In this system, the fundamental and harmonic wave channel are connected to the high frequency inverter jointly. The load parameter values can be obtained by setting the load equation based on the induced voltage of secondary-side network, the fundamental wave current, as well as the third harmonic current effective value received by the secondary-side current via Fourier decomposition. This method can achieve precise identification of all kinds of load types without interfering the normal energy transmission and it can not only increase the output power, but also obtain higher efficiency compared with the fundamental wave channel alone. The experimental results with the full-bridge LCCL-S type voltage-fed ICPT system have shown that this method is accurate and reliable.

Effects of Microtopography on the Development of Riparian Vegetation in Stream Corridors (하천통로에서 미세 지형 발달이 하천 식생에 미치는 영향)

  • 정경진;김동엽
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.27 no.4
    • /
    • pp.39-49
    • /
    • 1999
  • Urban streams have, recently, been straightened and widened to alleviate flooding problem. As a result, the stream have been modified inadvertently for ecological functions and microtopography. In this study, we investigated riparian vegetation and microtopography of the tributaries of Han River before and after the monsoon rain in summer. The purpose of this study was to relate the stream microtopography to the distribution of riparian vegetation. The stream microtopography was investigated for its scale and pattern. Vegetation was investigated from 131 plots by Braun-Blanquet method. The distribution of riparian vegetation was significantly correlated with the stream microtopography. Various herbaceous species occurred at stream bank slop, high terrace and channel side. However, at channel side and concave part of terrace where soils were in high moisture level, only a few wetland species were dominated. The complexity of the microtopography in the stream corridors led to heterogeneous riparian vegetation. The vegetation showed more stability against flooding at the stream corridors with natural and complex microtopography than at the urban-type stream corridors with simple topographical features. The results showed that the development of riparian vegetation was influenced by the changes in microtopography, which was primarily determined by the shape and characteristics of channel. It seemed that a close-to-nature river system would be restored more readily with an understanding of microtopographical features affecting the distribution of riparian vegetation.

  • PDF