• Title/Summary/Keyword: Side channel analysis

Search Result 358, Processing Time 0.025 seconds

Montgomery Multiplier with Very Regular Behavior

  • Yoo-Jin Baek
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.17-28
    • /
    • 2024
  • As listed as one of the most important requirements for Post-Quantum Cryptography standardization process by National Institute of Standards and Technology, the resistance to various side-channel attacks is considered very critical in deploying cryptosystems in practice. In fact, cryptosystems can easily be broken by side-channel attacks, even though they are considered to be secure in the mathematical point of view. The timing attack(TA) and the simple power analysis attack(SPA) are such side-channel attack methods which can reveal sensitive information by analyzing the timing behavior or the power consumption pattern of cryptographic operations. Thus, appropriate measures against such attacks must carefully be considered in the early stage of cryptosystem's implementation process. The Montgomery multiplier is a commonly used and classical gadget in implementing big-number-based cryptosystems including RSA and ECC. And, as recently proposed as an alternative of building blocks for implementing post quantum cryptography such as lattice-based cryptography, the big-number multiplier including the Montgomery multiplier still plays a role in modern cryptography. However, in spite of its effectiveness and wide-adoption, the multiplier is known to be vulnerable to TA and SPA. And this paper proposes a new countermeasure for the Montgomery multiplier against TA and SPA. Briefly speaking, the new measure first represents a multiplication operand without 0 digits, so the resulting multiplication operation behaves in a very regular manner. Also, the new algorithm removes the extra final reduction (which is intrinsic to the modular multiplication) to make the resulting multiplier more timing-independent. Consequently, the resulting multiplier operates in constant time so that it totally removes any TA and SPA vulnerabilities. Since the proposed method can process multi bits at a time, implementers can also trade-off the performance with the resource usage to get desirable implementation characteristics.

Forming process design for the twist reduction of an automotive front side member (프론트 사이드 멤버의 비틀림 저감을 위한 성형공정 설계)

  • Yin, Jeong-Je
    • Journal of the Korean Society of Mechanical Technology
    • /
    • v.13 no.1
    • /
    • pp.105-112
    • /
    • 2011
  • Increasing needs for light weight and high safety in modern automobiles induced the wide application of high strength steels in automotive body structures- The main difficulty in the forming of sheet metal parts with high strength steel is the large amount of springback including sidewall curl and twist in channel shaped member parts- Among these shape defects, twist occurs frequently and requires numerous reworks on the dies to compensate the shape deviation- But until now, it seems to be no effective method to reduce the twist in the forming processes- In this study, a new forming process to reduce the twist deformation during the forming of automotive structural member was suggested- This method consists of forming and restriking of embosses on the sidewall around the stretch flanging area of the part- and was applied in the forming process design of an automotive front side inner member with high strength steel- To evaluate the effectiveness of the method, springback analysis using $Pamstampa^{tm}$ was done- Through the analysis results, the suggested method was proven to be effective in twist reduction of channel shaped parts with stretch flanging area.

Modeling and Characterization of Low Voltage Access Network for Narrowband Powerline Communications

  • Masood, Bilal;Haider, Arsalan;Baig, Sobia
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.1
    • /
    • pp.443-450
    • /
    • 2017
  • Nowadays, Power Line Communication (PLC) is gaining high attention from industry and electric supply companies for the services like demand response, demand side management and Advanced Metering Infrastructure (AMI). The reliable services to consumers using PLC can be provided by utilizing an efficient PLC channel for which sophisticated channel modeling is very important. This paper presents characterization of a Low Voltage (LV) access network for Narrowband Power Line Communications (NB-PLC) using transmission line (TL) theory and a Simulink model. The TL theory analysis not only includes the constant parameters but frequency selectivity is also introduced in these parameters such as resistance, conductance and impedances. However, the proposed Simulink channel model offers an analysis and characterization of capacitive coupler, network impedance and channel transfer function for NB-PLC. Analysis of analytical and simulated results shows a close agreement of the channel transfer function. In the absence of a standardized NBPLC channel model, this research work can prove significant in improving the efficiency and accuracy of NB-PLC communication transceivers for Smart Grid communications.

Reverse Engineering of Deep Learning Network Secret Information Through Side Channel Attack (부채널 분석을 이용한 딥러닝 네트워크 신규 내부 비밀정보 복원 방법 연구)

  • Park, Sujin;Lee, Juheon;Kim, HeeSeok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.855-867
    • /
    • 2022
  • As the need for a deep learning accelerator increases with the development of IoT equipment, research on the implementation and safety verification of the deep learning accelerator is actively. In this paper, we propose a new side channel analysis methodology for secret information that overcomes the limitations of the previous study in Usenix 2019. We overcome the disadvantage of limiting the range of weights and restoring only a portion of the weights in the previous work, and restore the IEEE754 32bit single-precision with 99% accuracy with a new method using CPA. In addition, it overcomes the limitations of existing studies that can reverse activation functions only for specific inputs. Using deep learning, we reverse activation functions with 99% accuracy without conditions for input values with a new method. This paper not only overcomes the limitations of previous studies, but also proves that the proposed new methodology is effective.

Masking Exponential-Based Neural Network via Approximated Activation Function (활성화 함수 근사를 통한 지수함수 기반 신경망 마스킹 기법)

  • Joonsup Kim;GyuSang Kim;Dongjun Park;Sujin Park;HeeSeok Kim;Seokhie Hong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.761-773
    • /
    • 2023
  • This paper proposes a method to increase the power-analysis resistance of the neural network model's feedforward process by replacing the exponential-based activation function, used in the deep-learning field, with an approximated function especially at the multi-layer perceptron model. Due to its nature, the feedforward process of neural networks calculates secret weight and bias, which already trained, so it has risk of exposure of internal information by side-channel attacks. However, various functions are used as the activation function in neural network, so it's difficult to apply conventional side-channel countermeasure techniques, such as masking, to activation function(especially, to exponential-based activation functions). Therefore, this paper shows that even if an exponential-based activation function is replaced with approximated function of simple form, there is no fatal performance degradation of the model, and than suggests a power-analysis resistant feedforward neural network with exponential-based activation function, by masking approximated function and whole network.

A Forming and Springback Analysis for the U-channel Draw (U-channel Draw 성형 및 스프링백 해석)

  • Choi, E.K.;Park, K.S.;Oh, H.K.;Yu, D.H.;Lee, S.W.
    • Proceedings of the Korean Society for Technology of Plasticity Conference
    • /
    • 2008.05a
    • /
    • pp.465-468
    • /
    • 2008
  • In this paper, ABAQUS, one of the implicit finite element codes, is used to analyze the U-channel Draw benchmark problem of NUMISHEET 2005. Forming and springback stages have been done consecutively to compare their results with the experimental ones. The main measures for comparing are the side wall curl and angle. The result by numerical analysis are shown generally to be correspondent with the experimental results that the max. error is confined under about 10%.

  • PDF

Key Bit-dependent Attack on Side-Channel Analysis-Resistant Hardware Binary Scalar Multiplication Algorithm using a Single-Trace (부채널 분석에 안전한 하드웨어 이진 스칼라 곱셈 알고리즘에 대한 단일 파형 비밀 키 비트 종속 공격)

  • Sim, Bo-Yeon;Kang, Junki;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1079-1087
    • /
    • 2018
  • Binary scalar multiplication which is the main operation of elliptic curve cryptography is vulnerable to the side-channel analysis. Especially, it is vulnerable to the side-channel analysis which uses power consumption and electromagnetic emission patterns. Thus, various countermeasures have been studied. However, they have focused on eliminating patterns of data dependent branches, statistical characteristic according to intermediate values, or the interrelationships between data. No countermeasure have been taken into account for the secure design of the key bit check phase, although the secret scalar bits are directly loaded during that phase. Therefore, in this paper, we demonstrate that we can extract secret scalar bits with 100% success rate using a single power or a single electromagnetic trace by performing key bit-dependent attack on hardware implementation of binary scalar multiplication algorithm. Experiments are focused on the $Montgomery-L{\acute{o}}pez-Dahab$ ladder algorithm protected by scalar randomization. Our attack does not require sophisticated pre-processing and can defeat existing countermeasures using a single-trace. As a result, we propose a countermeasure and suggest that it should be applied.

Three Dimensional Finite Element Analysis of the Deformation Behavior of pure-Zr during Equal Channel Angular Pressing (등통로각압축(ECAP)공정에서 순수 지르코늄의 변형거동에 대한 3차원 유한요소 해석)

  • Lee, Kang-Moo;Kwon, Gi-Hwan;Kwun, Sook-In;Kim, Myung-Ho;Hwang, Sun-Keun;Chae, Soo-Won
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.27 no.9
    • /
    • pp.1539-1545
    • /
    • 2003
  • A lot of researches have been performed on the equal channel angular pressing (ECAP) which produces ultra-fine grains. Along with the experiments, the finite element method has been widely employed to investigate the deformation behavior of specimen during ECAP and the effects of process parameters of ECAP. In this paper, pure-Zirconium is considered for ECAP process by using three-dimensional finite element analysis. The results have been compared with those of previous two-dimensional analysis and with the experimental results

A Physical Combined Attack and its Countermeasure on BNP Exponentiation Algorithm (BNP 멱승 알고리듬에 대한 물리적인 조합 공격 및 대응책)

  • Kim, Hyung-Dong;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.585-591
    • /
    • 2013
  • Recently, the combined attack which is a combination of side channel analysis and fault attack has been developed to extract the secret key during the cryptographic processes using a security device. Unfortunately, an attacker can find the private key of RSA cryptosystem through one time fault injection and power signal analysis. In this paper, we diagnosed SPA/FA resistant BNP(Boscher, Naciri, and Prouff) exponentiation algorithm as having threats to a similar combined attack. And we proposed a simple countermeasure to resist against this combined attack by randomizing the private key using error infective method.

Mutual Information Analysis for Three-Phase Dynamic Current Mode Logic against Side-Channel Attack

  • Kim, Hyunmin;Han, Dong-Guk;Hong, Seokhie
    • ETRI Journal
    • /
    • v.37 no.3
    • /
    • pp.584-594
    • /
    • 2015
  • To date, many different kinds of logic styles for hardware countermeasures have been developed; for example, SABL, TDPL, and DyCML. Current mode-based logic styles are useful as they consume less power compared to voltage mode-based logic styles such as SABL and TDPL. Although we developed TPDyCML in 2012 and presented it at the WISA 2012 conference, we have further optimized it in this paper using a binary decision diagram algorithm and confirmed its properties through a practical implementation of the AES S-box. In this paper, we will explain the outcome of HSPICE simulations, which included correlation power attacks, on AES S-boxes configured using a compact NMOS tree constructed from either SABL, CMOS, TDPL, DyCML, or TPDyCML. In addition, to compare the performance of each logic style in greater detail, we will carry out a mutual information analysis (MIA). Our results confirm that our logic style has good properties as a hardware countermeasure and 15% less information leakage than those secure logic styles used in our MIA.