• Title/Summary/Keyword: AES-128

Search Result 109, Processing Time 0.018 seconds

Correlation Power Analysis Attacks on the Software based Salsa20/12 Stream Cipher (소프트웨어 기반 스트림 암호 Salsa20/12에 대한 상관도 전력분석 공격)

  • Park, Young-Goo;Bae, Ki-Seok;Moon, Sang-Jae;Lee, Hoon-Jae;Ha, Jae-Cheul;Ahn, Mahn-Ki
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.35-45
    • /
    • 2011
  • The Salsa20/12 stream cipher selected for the final eSTREAM portfolio has a better performance than software implementation of AES using an 8-bit microprocessor with restricted memory space, In the theoretical approach, the evaluation of exploitable timing vulnerability was 'none' and the complexity of side-channel analysis was 'low', but there is no literature of the practical result of power analysis attack. Thus we propose the correlation power analysis attack method and prove the feasibility of our proposed method by practical experiments, We used an 8-bit RISC AVR microprocessor (ATmegal128L chip) to implement Salsa20/12 stream cipher without any countermeasures, and performed the experiments of power analysis based on Hamming weight model.

Quantum Cryptanalysis for DES Through Attack Cost Estimation of Grover's Algorithm (Grover 알고리즘 공격 비용 추정을 통한 DES에 대한 양자 암호 분석)

  • Jang, Kyung-bae;Kim, Hyun-Ji;Song, Gyeong-Ju;Sim, Min-Ju;Woo, Eum-Si;Seo, Hwa-Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1149-1156
    • /
    • 2021
  • The Grover algorithm, which accelerates the brute force attack, is applicable to key recovery of symmetric key cryptography, and NIST uses the Grover attack cost for symmetric key cryptography to estimate the post-quantum security strength. In this paper, we estimate the attack cost of Grover's algorithm by implementing DES as a quantum circuit. NIST estimates the post-quantum security strength based on the attack cost of AES for symmetric key cryptography using 128, 192, and 256-bit keys. The estimated attack cost for DES can be analyzed to see how resistant DES is to attacks from quantum computers. Currently, since there is no post-quantum security index for symmetric key ciphers using 64-bit keys, the Grover attack cost for DES using 64-bit keys estimated in this paper can be used as a standard. ProjectQ, a quantum programming tool, was used to analyze the suitability and attack cost of the quantum circuit implementation of the proposed DES.

Efficient Implementation of Pseudorandom Functions for the e-seal Protection Protocol (E-seal 보안 프로토콜을 위한 Pseudorandom Function의 효율적인 구현)

  • Min Jung-Ki;Kang Seok-Hun;Chung Sang-Hwa;Kim Dong-Kyue
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.715-718
    • /
    • 2006
  • e-seal은 RFID 기술을 사용하여 원격에서 자동으로 봉인상태를 확인할 수 있는 컨테이너 봉인 장치를 말한다. RFID의 특징상 반도체 칩에 기록된 정보를 제 삼자가 쉽게 판독 및 변조할 수 있다는 취약점이 있는 실정이다. ISO에서는 RFID의 취약점을 보안하기 위한 표준작업(ISO 18185)을 진행 중이다. 이 중, ISO 18185-4는 e-seal에 저장되는 자료나 리더와의 RF통신에서 데이터 보호를 위한 표준이며, 관련된 연구로는 Active-RFID 인증 프로토콜과 ISO 18185-4를 위한 보고서로 제출된 보안 프로토콜 등이 있다. 제안된 e-seal 보안 프로토콜을 적용하기 위해서는 e-seal과 리더 간의 데이터를 암/복호화 키를 Pseudorandom Function(PRF)을 이용하여 마스터 키로부터 MTK(Mutual Transient Key)를 유도하고, MTK를 암/복호화 키로 사용해야 할 필요가 있다. 본 논문에서는 현재 보안 프로토콜에서 사용되고 있는 PRF에 대해 살펴보고, e-seal 환경에서 PRF를 소프트웨어로 구현하였다. 구현 결과 해시 함수를 기반으로 하는 PFR보다 암호화 알고리즘 AES를 기반으로 하는 PRF이 더 좋은 성능을 보였으며, 블록 암호화 알고리즘인 AES-128을 어셈블리어로 구현함으로써 PRF를 최적화하였다.

  • PDF

Development of field programmable gate array-based encryption module to mitigate man-in-the-middle attack for nuclear power plant data communication network

  • Elakrat, Mohamed Abdallah;Jung, Jae Cheon
    • Nuclear Engineering and Technology
    • /
    • v.50 no.5
    • /
    • pp.780-787
    • /
    • 2018
  • This article presents a security module based on a field programmable gate array (FPGA) to mitigate man-in-the-middle cyber attacks. Nowadays, the FPGA is considered to be the state of the art in nuclear power plants I&C systems due to its flexibility, reconfigurability, and maintainability of the FPGA technology; it also provides acceptable solutions for embedded computing applications that require cybersecurity. The proposed FPGA-based security module is developed to mitigate information-gathering attacks, which can be made by gaining physical access to the network, e.g., a man-in-the-middle attack, using a cryptographic process to ensure data confidentiality and integrity and prevent injecting malware or malicious data into the critical digital assets of a nuclear power plant data communication system. A model-based system engineering approach is applied. System requirements analysis and enhanced function flow block diagrams are created and simulated using CORE9 to compare the performance of the current and developed systems. Hardware description language code for encryption and serial communication is developed using Vivado Design Suite 2017.2 as a programming tool to run the system synthesis and implementation for performance simulation and design verification. Simple windows are developed using Java for physical testing and communication between a personal computer and the FPGA.

Performance Analysis and Comparison of Stream Ciphers for Secure Sensor Networks (안전한 센서 네트워크를 위한 스트림 암호의 성능 비교 분석)

  • Yun, Min;Na, Hyoung-Jun;Lee, Mun-Kyu;Park, Kun-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.3-16
    • /
    • 2008
  • A Wireless Sensor Network (WSN for short) is a wireless network consisting of distributed small devices which are called sensor nodes or motes. Recently, there has been an extensive research on WSN and also on its security. For secure storage and secure transmission of the sensed information, sensor nodes should be equipped with cryptographic algorithms. Moreover, these algorithms should be efficiently implemented since sensor nodes are highly resource-constrained devices. There are already some existing algorithms applicable to sensor nodes, including public key ciphers such as TinyECC and standard block ciphers such as AES. Stream ciphers, however, are still to be analyzed, since they were only recently standardized in the eSTREAM project. In this paper, we implement over the MicaZ platform nine software-based stream ciphers out of the ten in the second and final phases of the eSTREAM project, and we evaluate their performance. Especially, we apply several optimization techniques to six ciphers including SOSEMANUK, Salsa20 and Rabbit, which have survived after the final phase of the eSTREAM project. We also present the implementation results of hardware-oriented stream ciphers and AES-CFB fur reference. According to our experiment, the encryption speeds of these software-based stream ciphers are in the range of 31-406Kbps, thus most of these ciphers are fairly acceptable fur sensor nodes. In particular, the survivors, SOSEMANUK, Salsa20 and Rabbit, show the throughputs of 406Kbps, 176Kbps and 121Kbps using 70KB, 14KB and 22KB of ROM and 2811B, 799B and 755B of RAM, respectively. From the viewpoint of encryption speed, the performances of these ciphers are much better than that of the software-based AES, which shows the speed of 106Kbps.

Source Identification of Ambient PM-10 Using the PMF Model (PMF 모델을 이용한 대기 중 PM-10 오염원의 확인)

  • 황인조;김동술
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.19 no.6
    • /
    • pp.701-717
    • /
    • 2003
  • The objective of this study was to extensively estimate the air quality trends of the study area by surveying con-centration trends in months or seasons, after analyzing the mass concentration of PM-10 samples and the inorganic lements, ion, and total carbon in PM-10. Also, the study introduced to apply the PMF (Positive Matrix Factoriza-tion) model that is useful when absence of the source profile. Thus the model was thought to be suitable in Korea that often has few information about pollution sources. After obtaining results from the PMF modeling, the existing sources at the study area were qualitatively identified The PM-10 particles collected on quartz fiber filters by a PM-10 high-vol air sampler for 3 years (Mar. 1999∼Dec.2001) in Kyung Hee University. The 25 chemical species (Al, Mn, Ti, V, Cr, Fe, Ni, Cu, Zn, As, Se, Cd, Ba, Ce, Pb, Si, N $a^{#}$, N $H_4$$^{+}$, $K^{+}$, $Mg^{2+}$, $Ca^{2+}$, C $l^{[-10]}$ , N $O_3$$^{[-10]}$ , S $O_4$$^{2-}$, TC) were analyzed by ICP-AES, IC, and EA after executing proper pre - treatments of each sample filter. The PMF model was intensively applied to estimate the quantitative contribution of air pollution sources based on the chemical information (128 samples and 25 chemical species). Through a case study of the PMF modeling for the PM-10 aerosols. the total of 11 factors were determined. The multiple linear regression analysis between the observed PM-10 mass concentration and the estimated G matrix had been performed following the FPEAK test. Finally the regression analysis provided source profiles (scaled F matrix). So, 11 sources were qualitatively identified, such as secondary aerosol related source, soil related source, waste incineration source, field burning source, fossil fuel combustion source, industry related source, motor vehicle source, oil/coal combustion source, non-ferrous metal source, and aged sea- salt source, respectively.ively.y.

Proximate, Mineral and Sugar Composition of Rehmannia glutinosa by Cultivars (품종별 지황의 일반성분, 무기질 및 당 조성)

  • Oh, Hye-Lim;Kim, Na-Yeon;Lee, Kun-Jong;Yang, Kee-Heun;Doh, Eun-Soo;Song, Mi-Ran;Park, Jong-Yoon;Kim, Mee-Ree
    • Journal of the East Asian Society of Dietary Life
    • /
    • v.22 no.3
    • /
    • pp.365-370
    • /
    • 2012
  • Proximate composition, reducing sugar, and mineral content of several cultivars of Rehmannia glutinosa were analyzed. the moisture and soluble solid content of fresh Rehmannia glutinosa ('Korea', 'Kokang', 'Sewon 10', 'Sewon 11' and 'Jihwang 1') were 74.6~78.4% and $19.6{\sim}22.4^{\circ}Brix$, respectively. Proximate composition of dried Rehmannia glutinosa ranged from 82.91~86.94% carbohydrate, 3.38~5.70% crude protein, 2.5~3.0% crude ash and 3.47~3.80% fiber. Sugar composition by HPLC/ELSD showed that sucrose (4.49~7.75 g/100 g), raffinose (2.96~4.78 g/100 g) and stachyose (42.36~45.87 g/100 g) were present, whereas monosaccharides were not detected in 5 cultivars of dried Rehmannia glutinosa. Mineral compositions of dried Rehmannia glutinosa by ICP-AES were Ca (639.9~782.0 ppm), Fe (128.5~634.9 ppm), Na (119~150 ppm), K (6,639.1~10,448.0 ppm), Mg (372.2~981.8 ppm) and Zn (8.8~474.2 ppm). However, Co and Mo were not detected. Among 5 cultivars of Rehmannia glutinosa, 'Kokang' and 'Sewon 10' contain higher amounts of Fe, Ca, K, Mg, Cu and Zn than the other cultivars.

Novel Deep Learning-Based Profiling Side-Channel Analysis on the Different-Device (이종 디바이스 환경에 효과적인 신규 딥러닝 기반 프로파일링 부채널 분석)

  • Woo, Ji-Eun;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.987-995
    • /
    • 2022
  • Deep learning-based profiling side-channel analysis has been many proposed. Deep learning-based profiling analysis is a technique that trains the relationship between the side-channel information and the intermediate values to the neural network, then finds the secret key of the attack device using the trained neural network. Recently, cross-device profiling side channel analysis was proposed to consider the realistic deep learning-based profiling side channel analysis scenarios. However, it has a limitation in that attack performance is lowered if the profiling device and the attack device have not the same chips. In this paper, an environment in which the profiling device and the attack device have not the same chips is defined as the different-device, and a novel deep learning-based profiling side-channel analysis on different-device is proposed. Also, MCNN is used to well extract the characteristic of each data. We experimented with the six different boards to verify the attack performance of the proposed method; as a result, when the proposed method was used, the minimum number of attack traces was reduced by up to 25 times compared to without the proposed method.

Concentration of Heavy Metals, Residual Pesticides and Sulfur Dioxide of before/after a Decoction - In Prescription of Digestive System - (전탕 전과 후의 중금속, 잔류농약 및 잔류이산화황의 농도변화 - 소화기계 약을 중심으로 -)

  • Seo, Chang-Seob;Huang, Dae-Sun;Lee, Jun-Kyoung;Ha, Hye-Kyoung;Chun, Jin-Mi;Um, Young-Ran;Jang, Seol;Shin, Hyun-Kyoo
    • The Korea Journal of Herbology
    • /
    • v.24 no.1
    • /
    • pp.111-119
    • /
    • 2009
  • Objectives : To compare the contents of hazardous substances before/after a decoction. Methods : The heavy metal contents before/after a decoction were measured by Inductively Coupled Plasma Atomic Emission Spectrometer (ICP-AES) and mercury analyzer. In order to analyze pesticides in 6 samples we used simultaneous multi-residue analysis of pesticides by GC/ECD, which was followed by GC/MSD analysis to confirm the identity of the detected pesticide in each sample. In addition, the contents of sulfur dioxide (SO2) were performed by Monier-Williams distillation method. Results : 1. The mean values of heavy metal contents (mg/kg) for the samples were as follows: Samchulkunbi-tang (before decoction - Pb; 1.592, Cd; 0.155, As; 0.055 and Hg; 0.014, after decoction - Pb; 0.036, Cd; 0.002, As; not detected and Hg; 0.001), Yijin-tang (before decoction - Pb; 0.830, Cd; 0.077, As; 0.045 and Hg; 0.015, after decoction - Pb; 0.193, Cd; 0.010, As; not detected and Hg; 0.002), Banhabaikchulcheunma-tang (before decoction - Pb; 0.976, Cd; 0.164, As; 0.167 and Hg; 0.019, after decoction - Pb; 0.031, Cd; 0.003, As; 0.006 and Hg; 0.005), Pyungwi-san (before decoction - Pb; 2.162, Cd; 0.128, As; 0.061 and Hg; 0.018, after decoction - Pb; 0.080, Cd; 0.006, As; not detected and Hg; 0.005), Leejung-tang (before decoction - Pb; 1.480, Cd; 0.294, As; 0.034 and Hg; 0.012, after decoction - Pb; 0.064, Cd; 0.007, As; 0.007 and Hg; 0.002) and Kwibi-tang (before decoction - Pb; 0.907, Cd; 0.193, As; 0.085 and Hg; 0.020, after decoction - Pb; 0.072, Cd; 0.006, As; 0.004 and Hg; 0.002). 2. Contents (mg/kg) of sulfur dioxide ($SO_2$) before a decoction in Banhabaikchulcheunma-tang, Pyungwi-san, Leejung-tang and Kwibi-tang exhibited 3.5, 3.4, 3.8 and 12.4, respectively. However, contents of sulfur dioxide after a decoction in all samples were not detected. 3. Contents (mg/kg) of residual pesticides before/after a decoction in all samples were not detected. Conclusions : These results will be used to establish a criterion of heavy metals, residual pesticides and sulfur dioxide.