• Title/Summary/Keyword: side-channel analysis

Search Result 360, Processing Time 0.031 seconds

Structural Analysis of the Streptomyces avermitilis CYP107W1-Oligomycin A Complex and Role of the Tryptophan 178 Residue

  • Han, Songhee;Pham, Tan-Viet;Kim, Joo-Hwan;Lim, Young-Ran;Park, Hyoung-Goo;Cha, Gun-Su;Yun, Chul-Ho;Chun, Young-Jin;Kang, Lin-Woo;Kim, Donghak
    • Molecules and Cells
    • /
    • v.39 no.3
    • /
    • pp.211-216
    • /
    • 2016
  • CYP107W1 from Streptomyces avermitilis is a cytochrome P450 enzyme involved in the biosynthesis of macrolide oligomycin A. A previous study reported that CYP107W1 regioselectively hydroxylated C12 of oligomycin C to produce oligomycin A, and the crystal structure of ligand free CYP107W1 was determined. Here, we analyzed the structural properties of the CYP107W1-oligomycin A complex and characterized the functional role of the Trp178 residue in CYP107W1. The crystal structure of the CYP107W1 complex with oligomycin A was determined at a resolution of $2.6{\AA}$. Oligomycin A is bound in the substrate access channel on the upper side of the prosthetic heme mainly by hydrophobic interactions. In particular, the Trp178 residue in the active site intercalates into the large macrolide ring, thereby guiding the substrate into the correct binding orientation for a productive P450 reaction. A Trp178 to Gly mutation resulted in the distortion of binding titration spectra with oligomycin A, whereas binding spectra with azoles were not affected. The Gly178 mutant's catalytic turnover number for the 12-hydroxylation reaction of oligomycin C was highly reduced. These results indicate that Trp178, located in the open pocket of the active site, may be a critical residue for the productive binding conformation of large macrolide substrates.

Analysis of a Novel Elevated Source Drain MOSFET with Reduced Gate-Induced Drain Leakage and High Driving Capability (Gate-Induced Drain Leakage를 줄인 새로운 구조의 고성능 Elevated Source Drain MOSFET에 관한 분석)

  • Kim, Gyeong-Hwan;Choe, Chang-Sun;Kim, Jeong-Tae;Choe, U-Yeong
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.38 no.6
    • /
    • pp.390-397
    • /
    • 2001
  • A novel self-aligned ESD (Elevated Source Drain) MOSFET structure which can effectively reduce the GIDL (Gate-Induced Drain Leakage) current is proposed and analyzed. The proposed ESD structure is characterized by sidewall spacer and recessed-channel depth which are determined by dry-etching process. Elevation of the Source/Drain extension region is realized so that the low-activation effect caused by low-energy ion implantation can be avoided. Unlike the conventional LDD structures, it is shown that the GIDL current of the ESD structure is suppressed without sacrificing the maximum driving capability. The main reason for the reduction of GIDL current Is the decreased electric field at the point of the maximum band-to-band tunneling as the peak electric field is shifted toward the drain side.

  • PDF

New Pre-processing Method for Second-Order CPA on the IT Convergence Device (IT융합 디바이스에 대한 물리적 2차 CPA 공격을 위한 새로운 전처리 기법)

  • Lee, Chul-Hee;Hwang, Ah-Reum;Lee, Dong-Geon;Kim, Hyoung-Nam;Kim, Ho-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1369-1380
    • /
    • 2010
  • In this paper, we propose the efficient Second-Order Differential Power Analysis attack, which has ability to find significant information such as secret key in the devices consisting IT convergence environment such as Smartgrid, Advanced Metering Infrastructure(AMI) and ZigBee-based home networking service. This method helps to find the secret key easily at a device, even though it uses a countermeasure like masking which makes First-Order DPA attack harder. First, we present the performance results of our implementation which implements practical Second-Order DPA attack using the existing preprocessing function, and analyze it. Then we propose a stronger preprocessing function which overcomes countermeasures like masking. Finally, we analyze the results of the Second-Order CPA attack using proposed preprocessing function and verify that proposed scheme is very threatening to the security fields of IT convergence technology through the experimental results.

An Improved Dual-mode Laser Probing System for Fault Injecton Attack (오류주입공격에 대한 개선된 이중모드 레이저 프로빙 시스템)

  • Lee, Young Sil;Non, Thiranant;Lee, HoonJae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.453-460
    • /
    • 2014
  • Fault injection attack is the process of attempting to acquire the information on-chip through inject artificially generated error code into the cryptographic algorithms operation (or perform) which is implemented in hardware or software. From the details above, the laser-assisted failure injection attacks have been proven particularly successful. In this paper, we propose an improved laser probing system for fault injection attack which is called the Dual-Laser FA tool set, a hybrid approach of the Flash-pumping laser and fiber laser. The main concept of the idea is to improve the laser probe through utilizing existing equipment. The proposed laser probe can be divided into two parts, which are Laser-I for laser cutting, and Laser-II for fault injection. We study the advantages of existing equipment, and consider the significant parameters such as energy, repetition rate, wavelength, etc. In this approach, it solves the high energy problem caused by flash-pumping laser in higher repetition frequency from the fiber laser.

Performance Analysis of Spread Spectrum Underwater Communication Method Based on Multiband (다중 밴드 기반 대역 확산 수중통신 기법 성능분석)

  • Shin, Ji-Eun;Jeong, Hyun-Woo;Jung, Ji-Won
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.5
    • /
    • pp.344-352
    • /
    • 2020
  • Covertness and performance are very important design goals in the underwater communications. To satisfy both of them, we proposed efficient underwater communication model which combined multiband and direct sequence spread spectrum method in order to improve performance and covertness simultaneously. Turbo coding method with 1/3 coding rates is used for channel coding algorithm, and turbo equalization method which iterately exchange probabilistic information between equalizer and decoder is used for receiver side. After optimal threshold value was set in Rake processing, this paper analyzed the performance by varying the number of chips were 8, 16, 32 and the number of bands were from 1 to 4. Through the simulation results, we confirmed that the performance improvement was obtained by increasing the number of bands and chips. 2~3 dB of performance gain was obtained when the number of chips were increased in same number of bands.

Power Monitoring System with Multiple Input Channels Using the Definition of IEEE Standard 1459-2010 (IEEE 1459-2010 규격의 정의를 이용한 다중 입력 채널을 갖는 전력 감시 시스템)

  • Jeon, Jeong-Chay;Oh, Hun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.5
    • /
    • pp.3100-3106
    • /
    • 2014
  • This paper develops power measurement system with multiple sensor input channels (voltage-8 channels and current-10 channels) that simultaneously can monitor power components for both supply and load side of power system. The hardware implementation of the proposed system is based on TMS320C42 DSP and signal processing program algorithm to calculate power components use the definition of IEEE Standard 1459-2010 related power quality. The performance of the developed system is tested by using standard ac power source device, and the test results showed that accuracy of the developed system is less than 0.2 %. Also, field test of the proposed system in the three-phase and four-wire power system was implemented. Simultaneous multiple channel measurement and analysis of power components in commercial and industrial electrical power system using the proposed system will be necessary to reduce power quality problems.

Improved Security Analysis of Reduced SMS4 Block Cipher (축소된 SMS4 블록 암호에 대한 향상된 안전성 분석)

  • Kim, Tae-Hyun;Kim, Jong-Sung;Hong, Seok-Hie;Sung, Jae-Chul;Lee, Chang-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.3-10
    • /
    • 2009
  • In this paper, we introduce improved differential and linear attacks on the SMS4 block cipher which is used in the Chinese national standard WAPI (WLAN Authentication and Privacy Infrastructure, WLAN - Wireless Local Area Network): First, we introduce how to extend previously known differential attacks on SMS4 from 20 or 21 to 22 out of the full 32 rounds. Second, we improve a previously known linear attack on 22-round reduced SMS4 from $2^{119}$ known plaintexts, $2^{109}$ memory bytes, $2^{117}$ encryptions to $2^{117}$ known plaintexts, $2^{l09}$ memory bytes, $2^{112.24}$ encryptions, by using a new linear approximation.

Electromagnetic and Thermal Information Utilization System to Improve The Success Rate of Laser Fault Injection Attack (레이저 오류 주입 공격 성공률 향상을 위한 전자파 및 열 정보 활용 시스템)

  • Mun, HyeWon;Ji, Jae-deok;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.965-973
    • /
    • 2022
  • As IoT(Internet of Things) devices become common, many algorithms have been developed to protect users' personal information. The laser fault injection attack that threatens those algorithms is a side-channel analysis that intentionally injects a laser beam to the outside of a device to acquire confidential information or abnormal privileges of the system. There are many studies to determine the timing of fault injection to reduce the number of necessary fault injections, but the location to inject faults is only repeatedly searched for the entire area of the device. However, when fault injection is performed in an algorithm-independent area, the attacker cannot obtain the intended faulted statement or attempt to bypass authentication, so finding areas vulnerable to fault injection and performing an attack is an important consideration in achieving a high attack success rate. In this paper, we show that a 100% attack success rate can be achieved by determining the vulnerable areas for fault injection by using electromagnetic and thermal information generated from the device's chip. Based on this, we propose an efficient fault injection attack system.

Numerical study on the pressure drop and heat transfer enhancement in a flat-plate solar collector (평판형 태양열 집열기의 압력강하 및 열전달 성능 향상에 관한 수치해석적 연구)

  • Heo, Joo-Nyoung;Shin, Jee-Young;Lee, Dooho;Son, Young-Seok
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.37 no.4
    • /
    • pp.316-323
    • /
    • 2013
  • The use of artificial roughness in various forms of shapes and sizes is the most common and effective way to improve the performance of a flat-plate solar collector. In the present study, numerical analysis on heat transfer and pressure drop was performed in a rectangular channel with various rib arrays. The uniform heat flux is applied to the channel from the upper side. The forms of ribs considered in this study were rib $90^{\circ}$, groove $90^{\circ}$, groove $60^{\circ}$, baffle $90^{\circ}$, baffle $60^{\circ}$, wave $90^{\circ}$ and wave $60^{\circ}$. Air is the working fluid, and the Reynolds number ranges from 3200 to 17800. Nusselt number and friction factor were investigated to predict the performance of the system with various type of ribs. The average Nusselt number and pressure drop were increased with the increase of velocity in all types of ribs. The highest heat transfer and pressure drop occurred for the baffle $90^{\circ}$, but highest performance factor considering heat transfer and pressure drop together occurred for the groove $60^{\circ}$. Therefore, heat transfer and pressure drop should be considered together when a flat plate solar collector is designed.

An Empirical Study on the Effects of e-Mail Marketing : A focus on e-Mail Campaign for Credit Card Consumers (이메일 마케팅 성과에 관한 연구: 신용카드 고객을 대상으로 한 캠페인을 중심으로)

  • Shin, Sung-Hoon;Chung, Soo-Yeon;Park, Cheol
    • Information Systems Review
    • /
    • v.11 no.1
    • /
    • pp.49-67
    • /
    • 2009
  • E-mail marketing is the cheapest channel in target marketing. The channel works amazingly well for marketers who know how to use it. The e-mail marketers are able to integrate transactional and behavioral data to improve the targeting content of e-mail marketing campaigns. The cost in e-mail marketing is low and e-mail marketing makes no pollution. But, the e-mail response rate is lower than all the other channels. So, it is very hard for companies to increase their sales volumes, though the companies are ready to execute e-mail marketing campaigns on the side of computer systems. Marketers can send messages easily to target customers compared to other channels. But, the possibility to be read by the customers is low. Normal e-mails are continually devalued by spam mails. This study shows the influence of e-mail marketing to increase sales used by credit cards, on the basis of the real data promoted by A bank, in the Republic of Korea. The analysis on the traits of the respondent can help marketers to target customers. If additional studies on the response prediction model on the basis of traits of potential respondents are done, the targeting method to increase the effectiveness of e-mail marketing will be better structured and organized.