• Title/Summary/Keyword: side-channel analysis

Search Result 359, Processing Time 0.025 seconds

Side Channel Analysis of the S/W AES with Uniform Hamming Weight Representation (균일한 해밍웨이트를 제공하는 소프트웨어 AES에 대한 부채널 분석)

  • Won, Yoo-Seung;Han, Dong-Guk;Choi, Dooho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.675-678
    • /
    • 2013
  • 암호 알고리즘이 탑재된 환경에서 암호 알고리즘의 이론적 안전성이 고려되어도 환경에 의존한 부가적 정보를 활용하는 부채널 분석에 대한 안전성이 검토되어야 한다. 최근까지 부채널 분석에 대한 안전성을 고려한 대응기법으로 마스킹 기법이 적용되었으나, 이와는 상반된 개념인 하드웨어 DPL(Dual-rail with Precharge Logic) 기법을 응용한 균일한 해밍웨이트를 제공하는 소프트웨어 AES(Advanced Encryption Standard)가 제안되었다. 최근, 소프트웨어 기반 블록암호에 대해 고차 마스킹 부채널 대응법의 비효율성으로 새로운 방법에 대한 다양한 시도가 되고 있으며, 그 중 균일한 해밍웨이트를 제공하는 표현 방법이 효율적이고 안전한 새로운 대응법으로 검토되어지고 있다. 하지만, 논문에서는 균일한 해밍웨이트 데이터 표현방법 기반 부채널 대응법을 해독하는 차분전력분석 방법을 소개한다. 실험을 통해, AES 128비트 키 중 일부분이 분석됨을 확인하였다. 이는 공격자가 테이블 변환 정보를 활용할 수 있다는 다소 강력한 가정하에 실험하였기 때문이다. 앞선 가정 하에 안전성을 제공하기 위해서는 차후 추가적 대응기법이 고려되어야 한다.

A Key Recovery Attack on HMAC using Fault Injection Attack (오류 주입 공격을 이용한 HMAC에 대한 키 복구 공격)

  • Jeong, Ki-Tae;Lee, Yu-Seop;Sung, Jae-Chul;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.27-33
    • /
    • 2011
  • At FDTC'05 and CISC-W'10, the authors showed that if they decrease the number of rounds of AES and Triple-DES by using the fault injections, it is possible to recover the secret key of the target algorithms, respectively. In this paper, we propose a key recovery attack on HMAC by using the main idea of these attacks. This attack is applicable to HMAC based on MD-family hash functions and can recover the secret key with the negligible computational complexity. Particularly, the attack result on HMAC-SHA-2 is the first known key recovery attack result on this algorithm.

A Fault Injection Attack on Stream Cipher A5/3 (스트림 암호 A5/3에 대한 오류 주입 공격)

  • Jeong, Ki-Tae;Lee, Yu-Seop;Sung, Jae-Chul;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.3-10
    • /
    • 2012
  • In this paper, we propose a fault injection attack on stream cipher A5/3 used in GSM. The fault assumption of this attack is based on that of fault injection attacks proposed in FDTC'05 and CISC-W'10. This attack is applicable to A5/3 supporting 64/128-bit session key, respectively, and can recover the session key by using a small number of fault injections. These works are the first known key recovery attack results on A5/3.

Effects of Omnichannel on Pleasure, Resistance, and Repurchase Intention

  • JUNG, Eun-A;KIM, Jung-Hee
    • Journal of Distribution Science
    • /
    • v.20 no.3
    • /
    • pp.95-106
    • /
    • 2022
  • Purpose: This study aims to verify the effects of omnichannel characteristics on pleasure, resistance and repurchase intention in the omnichannel situation in order to provide the innovative commercial business. Research design, data and methodology: The study examined relations between research concepts centered on previous studies, set hypotheses, developed a research model, and verified the model through a questionnaire survey. A total of 297 questionnaires were used for the final analysis, excluding the questionnaires showing insincere or outliers. Results: First, Omnichannel showed multi-dimensional characteristics consisting of consistency, innovation, economy, and integration. Second, innovation and economic feasibility had a positive effect on pleasure. Third, only economic feasibility had a negative effect on user resistance. Fourth, consumers' shopping pleasure had a negative effect on user resistance. Fifth, repurchase intention of consumers was positively affected by innovation. Conclusions: This research contributed to extend academic framework of distribution research by examining causal relationship through adoption of economic and innovation factors as new characteristics from the integrated perspective beyond the research frame of the existing omnichannel distribution environment. Companies should provide meaningful experiences by resolving concerns about side effects caused by human-computer interaction and providing smart information that matches the products most suitable for consumer needs.

Side-Channel analysis and masking scheme for domestic lightweight cipher PIPO (국산 경량 암호 PIPO에 대한 부채널 분석과 마스킹 기법 제안)

  • Sim, Min-Joo;Kim, Hyun-Jun;Kwon, Hyeok-Dong;Jang, Kyung-Bae;Kim, Hyun-Ji;Park, Jae-Hoon;Eum, Si-Woo;Song, Gyeong-Ju;Seo, Hwa-Jeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.171-174
    • /
    • 2021
  • 최근 사물인터넷(IoT) 환경에서 다양한 장비의 인터넷 통신이 가능하여 이에 적절한 경량 블록 암호 알고리즘에 대한 연구가 활발히 진행되고 있다. ICISC 2020에서 새로 발표된 국산 경량 블록 암호 알고리즘인 PIPO는 새로운 경량 S-Box를 조합한 unbalanced-Bridge 구조로 효율적인 비트슬라이싱 구현을 제공한다. IoT 환경에 PIPO가 적용되기 위해서는 부채널 분석에 대한 안전성이 보장되어야 한다. 따라서 본 논문에서는 PIPO가 1차 CPA 공격에 취약함을 확인한다. 그리고 부채널 공격에 대응하기 위해 1차 마스킹 기법을 제안한다. 제안한 마스킹 기법은 1차 CPA 공격에 안전하였으며, 마스킹 적용 전보다 -375%의 성능을 보였다. 그리고 기존 기법보다 1287% 속도가 빨라진 것을 확인하였다.

Correlation Power Analysis Attack on Lightweight Block Cipher LEA and Countermeasures by Masking (경량 블록암호 LEA에 대한 상관관계 전력분석 공격 및 마스킹 대응 기법)

  • An, Hyo-Sik;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.7
    • /
    • pp.1276-1284
    • /
    • 2017
  • Lightweight Encryption Algorithm (LEA) that was standardized as a lightweight block cipher was implemented with 8-bit data path, and the vulnerability of LEA encryption processor to correlation power analysis (CPA) attack was analyzed. The CPA used in this paper detects correct round keys by analyzing correlation coefficient between the Hamming distance of the computed data by applying hypothesized keys and the power dissipated in LEA crypto-processor. As a result of CPA attack, correct round keys were detected, which have maximum correlation coefficients of 0.6937, 0.5507, and this experimental result shows that block cipher LEA is vulnerable to power analysis attacks. A masking method based on TRNG was proposed as a countermeasure to CPA attack. By applying masking method that adds random values obtained from TRNG to the intermediate data of encryption, incorrect round keys having maximum correlation coefficients of 0.1293, 0.1190 were analyzed. It means that the proposed masking method is an effective countermeasure to CPA attack.

Analysis of U.S. Port Efficiency Using Double-Bootstrapped DEA (이중 부트스트랩 DEA 활용한 미국항만 효율성 분석)

  • Lee, Yong Joo;Park, Hong-Gyun;Lee, Kwang-Bae
    • Journal of Korea Port Economic Association
    • /
    • v.37 no.3
    • /
    • pp.75-91
    • /
    • 2021
  • Due to increased competition in supply side to reduce operational costs, port professionals have experienced extreme pressure, which demanded academicians to develop the model for efficient port operations from the industry perspective. Among many ports in the world, U.S. ports are our primary interest to analyze in our study for its high volume of cargoes transacted in the U.S. ports. We primarily employed DEA (Data Envelopment Analysis) technique to research the productivity of U.S. ports and applied the algorithm of double bootstrapped DEA proposed by Simar & Wilson (2007) to further investigate the driving forces of the performance of U.S. port operations. The external variables employed in our study comprise onDock Rail, Channel Depth, Location, Area, Acres, ForeignCargoRatio, and TEUChange, out of which onDock Rail, Acres, ForeignCargoRatio, and TEUChange were significant. In order to evaluate the effects of methodology selection, we conducted the same analysis applying the Censored model (Tobit) and contrasted the outcomes drawn from the two different techniques. Based on the findings from this work we proposed managerial implications and concluded.

Hardware Implementation of Elliptic Curve Scalar Multiplier over GF(2n) with Simple Power Analysis Countermeasure (SPA 대응 기법을 적용한 이진체 위의 타원곡선 스칼라곱셈기의 하드웨어 구현)

  • 김현익;정석원;윤중철
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.41 no.9
    • /
    • pp.73-84
    • /
    • 2004
  • This paper suggests a new scalar multiplication algerian to resist SPA which threatens the security of cryptographic primitive on the hardware recently, and discusses how to apply this algerian Our algorithm is better than other SPA countermeasure algorithms aspect to computational efficiency. Since known SPA countermeasure algorithms have dependency of computation. these are difficult to construct parallel architecture efficiently. To solve this problem our algorithm removes dependency and computes a multiplication and a squaring during inversion with parallel architecture in order to minimize loss of performance. We implement hardware logic with VHDL(VHSIC Hardware Description Language) to verify performance. Synthesis tool is Synplify Pro 7.0 and target chip is Xillinx VirtexE XCV2000EFGl156. Total equivalent gate is 60,508 and maximum frequency is 30Mhz. Our scalar multiplier can be applied to digital signature, encryption and decryption, key exchange, etc. It is applied to a embedded-micom it protects SPA and provides efficient computation.

A Power Analysis Attack Countermeasure Not Using Masked Table for S-box of AES, ARIA and SEED (마스킹 테이블을 사용하지 않는 AES, ARIA, SEED S-box의 전력 분석 대응 기법)

  • Han, Dong-Guk;Kim, Hee-Seok;Song, Ho-Geun;Lee, Ho-Sang;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.149-156
    • /
    • 2011
  • In the recent years, power analysis attacks were widely investigated, and so various countermeasures have been proposed. In the case of block ciphers, masking methods that blind the intermediate values in the en/decryption computations are well-known among these countermeasures. But the cost of non-linear part is extremely high in the masking method of block cipher, and so the countermeasure for S-box must be efficiently constructed in the case of AES, ARIA and SEED. Existing countermeasures for S-box use the masked S-box table to require 256 bytes RAM corresponding to one S-box. But, the usage of the these countermeasures is not adequate in the lightweight security devices having the small size of RAM. In this paper, we propose the new countermeasure not using the masked S-box table to make up for this weak point. Also, the new countermeasure reduces time-complexity as well as the usage of RAM because this does not consume the time for generating masked S-box table.

Numerical study on the thermal-hydraulic safety of the fuel assembly in the Mast assembly (수치해석을 이용한 마스트집합체 내 핵연료 집합체의 열수력적 안전성 연구)

  • Kim, YoungSoo;Yun, ByongJo;Kim, HuiYung;Jeon, JaeYeong
    • Journal of Energy Engineering
    • /
    • v.24 no.1
    • /
    • pp.149-163
    • /
    • 2015
  • In this study, we conducted study on the confirmation of thermal-hydraulic safety for Mast assembly with Computational Fluid Dynamics(CFD) analysis. Before performing the natural convection analysis for the Mast assembly by using CFD code, we validated the CFD code against two benchmark natural convection data for the evaluation of turbulence models and confirmation of its applicability to the natural convection flow. From the first benchmark test which was performed by Betts et al. in the simple rectangular channel, we selected standard k-omega turbulence model for natural convection. And then, calculation performance of CFD code was also investigated in the sub-channel of rod bundle by comparing with PNL(Pacific Northwest Laboratory) experimental data and prediction results by MATRA and Fluent 12.0 which were performed by Kwon et al.. Finally, we performed main natural convection analysis for fuel assembly inside the Mast assembly by using validated turbulence model. From the calculation, we observed stable natural circulation flow between the mast assembly and pool side and evaluated the thermal-hydraulic safety by calculating the departure from nucleate boiling ratio.