• Title/Summary/Keyword: Side Channel

Search Result 926, Processing Time 0.025 seconds

Differential Fault Attack on SSB Cipher (SSB 암호 알고리즘에 대한 차분 오류 공격)

  • Kang, HyungChul;Lee, Changhoon
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.1
    • /
    • pp.48-52
    • /
    • 2015
  • In this paper, we propose a differential fault analysis on SSB having same structure in encryption and decryption proposed in 2011. The target algorithm was designed using advanced encryption standard and has advantage about hardware implementations. The differential fault analysis is one of side channel attacks, combination of the fault injection attacks with the differential cryptanalysis. Because SSB is suitable for hardware, it must be secure for the differential fault analysis. However, using proposed differential fault attack in this paper, we can recover the 128 bit secret key of SSB through only one random byte fault injection and an exhausted search of $2^8$. This is the first cryptanalytic result on SSB having same structure in encryption and decryption.

A Study on the E-PON Transceiver with ONU Power Equalization Function (ONU 파워 균등화 기능을 갖는 E-PON 송수신기에 관한 연구)

  • 임충환;정인권;박영일
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7A
    • /
    • pp.735-740
    • /
    • 2004
  • When optical signal power of ONU differs from each other the requirements of an OLT receiver becomes strict and the stable operation of a total PON system can't be obtained. To solve this problem each ONU channel's signal power is measured at the OLT side and control signals to equalize them are generated and sent to each ONU. The proposed scheme is tested after implementation A digital APC circuit is proposed and tested so that it can start or stop LD operation without delay. It helps other ONU to transmit signals without interference and to reduce consuming power.

A Novel Resource Allocation Algorithm in Multi-media Heterogeneous Cognitive OFDM System

  • Sun, Dawei;Zheng, Baoyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.691-708
    • /
    • 2010
  • An important issue of supporting multi-users with diverse quality-of-service (QoS) requirements over wireless networks is how to optimize the systematic scheduling by intelligently utilizing the available network resource while, at the same time, to meet each communication service QoS requirement. In this work, we study the problem of a variety of communication services over multi-media heterogeneous cognitive OFDM system. We first divide the communication services into two parts. Multimedia applications such as broadband voice transmission and real-time video streaming are very delay-sensitive (DS) and need guaranteed throughput. On the other side, services like file transmission and email service are relatively delay tolerant (DT) so varying-rate transmission is acceptable. Then, we formulate the scheduling as a convex optimization problem, and propose low complexity distributed solutions by jointly considering channel assignment, bit allocation, and power allocation. Unlike prior works that do not care computational complexity. Furthermore, we propose the FAASA (Fairness Assured Adaptive Sub-carrier Allocation) algorithm for both DS and DT users, which is a dynamic sub-carrier allocation algorithm in order to maximize throughput while taking into account fairness. We provide extensive simulation results which demonstrate the effectiveness of our proposed schemes.

The Performance Analysis Method with New Pressure Loss and Leakage Flow Models of Regenerative Blower

  • Lee, Chan;Kil, Hyun Gwon;Kim, Kwang Yeong
    • International Journal of Fluid Machinery and Systems
    • /
    • v.8 no.4
    • /
    • pp.221-229
    • /
    • 2015
  • For efficient design process of regenerative blower, the present study provides new generalized pressure and leakage flow loss models, which can be used in the performance analysis method of regenerative blower. The present performance analysis on designed blower is made by incorporating momentum exchange theory between impellers and side channel with mean line analysis method, and its pressure loss and leakage flow models are generalized from the related fluid mechanics correlations which can be expressed in terms of blower design variables. The present performance analysis method is applied to four existing models for verifying its prediction accuracy, and the prediction and the test results agreed well within a few percentage of relative error. Furthermore, the present performance analysis method is also applied in developing a new blower used for fuel cell application, and the newly designed blower is manufactured and tested through chamber-type test facility. The performance prediction by the present method agreed well with the test result and also with the CFD simulation results. From the comparison results, the present performance analysis method is shown to be suitable for the actual design practice of regenerative blower.

Insecticide Targets: Learning to Keep Up with Resistance and Changing Concepts of Safety

  • Casida, John E.;Quistad, Gary B.
    • Journal of Applied Biological Chemistry
    • /
    • v.43 no.4
    • /
    • pp.185-191
    • /
    • 2000
  • Pest insect control is dependent on about 200 insecticides that work by relatively few mechanisms. The targets they disrupt are mostly involved in the nervous system, respiratory chain, growth and development, or the gut. The major nerve targets are: acetylcholinesterase for the organophosphates and methylcarbamates; the nicotinic acetylcholine receptor for the neonicotinoids; the $\gamma$-aminobutyric acid receptor for several chlorinated hydrocarbons and fipronil; the voltage-gated sodium channel for DDT and pyrethroids. Selection of resistant strains often confers cross-resistance to some or all other insecticides working at the same site. The toxicological properties of different compounds acting on the same target are increasingly considered together, summating the risk even though the compounds are of quite diverse chemical types. Continuing attention is also being given to secondary targets not involved in the primary mechanism of toxicity but instead in side effects that must be considered in the overall safety evaluation. Research on insecticide targets is important in learning to keep up with resistance and changing concepts and policies on safety. These relationships are illustrated by recent studies in the Environmental Chemistry and Toxicology Laboratory of the University of California at Berkeley.

  • PDF

Practical Second-Order Correlation Power Analysis on the Message Blinding Method and Its Novel Countermeasure for RSA

  • Kim, Hee-Seok;Kim, Tae-Hyun;Yoon, Joong-Chul;Hong, Seok-Hie
    • ETRI Journal
    • /
    • v.32 no.1
    • /
    • pp.102-111
    • /
    • 2010
  • Recently power attacks on RSA cryptosystems have been widely investigated, and various countermeasures have been proposed. One of the most efficient and secure countermeasures is the message blinding method, which includes the RSA derivative of the binary-with-random-initial-point algorithm on elliptical curve cryptosystems. It is known to be secure against first-order differential power analysis (DPA); however, it is susceptible to second-order DPA. Although second-order DPA gives some solutions for defeating message blinding methods, this kind of attack still has the practical difficulty of how to find the points of interest, that is, the exact moments when intermediate values are being manipulated. In this paper, we propose a practical second-order correlation power analysis (SOCPA). Our attack can easily find points of interest in a power trace and find the private key with a small number of power traces. We also propose an efficient countermeasure which is secure against the proposed SOCPA as well as existing power attacks.

Differential Fault Analysis on Symmetric SPN Block Cipher with Bitslice Involution S-box (비트 슬라이스 대합 S-박스에 의한 대칭 SPN 블록 암호에 대한 차분 오류 공격)

  • Kang, HyungChul;Lee, Changhoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.3
    • /
    • pp.105-108
    • /
    • 2015
  • In this paper, we propose a differential fault analysis on symmetric SPN block cipher with bitslice involution S-box in 2011. The target block cipher was designed using AES block cipher and has advantage about restricted hardware and software environment using the same structure in encryption and decryption. Therefore, the target block cipher must be secure for the side-channel attacks. However, to recover the 128-bit secret key of the targer block cipher, this attack requires only one random byte fault and an exhausted search of $2^8$. This is the first known cryptanalytic result on the target block cipher.

Development of Low-Vgs N-LDMOS Structure with Double Gate Oxide for Improving Rsp

  • Jeong, Woo-Yang;Yi, Keun-Man
    • Transactions on Electrical and Electronic Materials
    • /
    • v.10 no.6
    • /
    • pp.193-195
    • /
    • 2009
  • This paper aims to develop a low gate source voltage ($V_{gs}$) N-LDMOS element that is fully operational at a CMOS Logic Gate voltage (3.3 or 5 V) realized using the 0.35 μm BCDMOS process. The basic structure of the N-LDMOS element presented here has a Low $V_{gs}$ LDMOS structure to which the thickness of a logic gate oxide is applied. Additional modification has been carried out in order to obtain features of an improved breakdown voltage and a specific on resistance ($R_{sp}$). A N-LDMOS element can be developed with improved features of breakdown voltage and specific on resistance, which is an important criterion for power elements by means of using a proper structure and appropriate process modification. In this paper, the structure has been made to withstand the excessive electrical field on the drain side by applying the double gate oxide structure to the channel area, to improve the specific on resistance in addition to providing a sufficient breakdown voltage margin. It is shown that the resulting modified N-LDMOS structure with the feature of the specific on resistance is improved by 31%, and so it is expected that optimized power efficiencies and the size-effectiveness can be obtained.

Efficient Masked Implementation for SEED Based on Combined Masking

  • Kim, Hee-Seok;Cho, Young-In;Choi, Doo-Ho;Han, Dong-Guk;Hong, Seok-Hie
    • ETRI Journal
    • /
    • v.33 no.2
    • /
    • pp.267-274
    • /
    • 2011
  • This paper proposes an efficient masking method for the block cipher SEED that is standardized in Korea. The nonlinear parts of SEED consist of two S-boxes and modular additions. However, the masked version of these nonlinear parts requires excessive RAM usage and a large number of operations. Protecting SEED by the general masking method requires 512 bytes of RAM corresponding to masked S-boxes and a large number of operations corresponding to the masked addition. This paper proposes a new-style masked S-box which can reduce the amount of operations of the masking addition process as well as the RAM usage. The proposed masked SEED, equipped with the new-style masked S-box, reduces the RAM requirements to 288 bytes, and it also reduces the processing time by 38% compared with the masked SEED using the general masked S-box. The proposed method also applies to other block ciphers with the same nonlinear operations.

An Efficient Secrete Key Protection Technique of Scan-designed AES Core (스캔 설계된 AES 코아의 효과적인 비밀 키 보호 기술)

  • Song, Jae-Hoon;Jung, Tae-Jin;Jeong, Hye-Ran;Kim, Hwa-Young;Park, Sung-Ju
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.47 no.2
    • /
    • pp.77-86
    • /
    • 2010
  • This paper presents an efficient secure scan design technique which is based on a fake key and IEEE 1149.1 instruction to protect secret key from scan-based side channel attack for an Advanced Encryption Standard (AES) core embedded on an System-on-a-Chip (SoC). Our proposed secure scan design technique can be applied to crypto IP core which is optimized for applications without the IP core modification. The IEEE 1149.1 standard is kept, and low area, low power consumption, very robust secret-key protection and high fault coverage can be achieved compared to the existing methods.