• Title/Summary/Keyword: Fault Injection Techniques

Search Result 12, Processing Time 0.022 seconds

The DC Link Energy Control Method of Dynamic Voltage Restorer System (DVR(Dynamic Voltage Restorer)에서의 직류에너지 제어 방법)

  • Jeong, Il-Yeop;Park, Sang-Yeong;Won, Dong-Jun;Mun, Seung-Il;Park, Jong-Geun;Han, Byeong-Mun
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.50 no.12
    • /
    • pp.575-583
    • /
    • 2001
  • Dynamic Voltage Restorer(DVR) which is installed between the supply and a critical load can restore voltage disturbances in distribution system. The restoration is based on injecting the same voltages as voltage sags. The ideal restoration is compensation to make the load voltages be unchanged. But voltage restoration involves real power or energy injection and the capability of energy storage is limited. So it must be considered how injection energy can be minimized and voltages can be made close to the voltages before fault. This paper describes conventional restoration techniques, which draw minimum energy from the DVR in order to correct a given voltage sag or swell. And this paper proposes a new concept of restoration technique to inject minimum energy. The proposed method is based on the definition of voltage tolerance in load side. Hence using the proposed method a particular disturbance can be corrected with less amount of storage energy compared to those of conventional methods.

  • PDF

Hardware Fault Attack Resistant RSA-CRT with Parallel Support (오류주입 공격에 강건하며 병렬연산이 가능한 RSA-CRT)

  • Eun, Ha-Soo;Oh, Hee-Kuck;Kim, Sang-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.5
    • /
    • pp.59-70
    • /
    • 2012
  • RSA-CRT is one of the commonly used techniques to speedup RSA operation. Since RSA-CRT performs its operations based on the modulus of two private primes, it is about four times faster than RSA. In RSA, the two primes are normally thrown away after generating the public key pair. However, in RSA-CRT, the two primes are directly used in RSA operations. This led to hardware fault attacks which can be used to factor the public modulus. The most common way to counter these attacks is based on error propagation. In these schemes, all the outputs of RSA are affected by the infected error which makes it difficult for an adversary to use the output to factor the public modulus. However, the error propagation has sequentialized the RSA operation. Moreover, these schemes have been found to be still vulnerable to hardware fault attacks. In this paper, we propose two new RSA-CRT schemes which are both resistant to hardware fault attack and support parallel execution: one uses common modulus and the other one perform operations in each prime modulus. Both proposed schemes takes about a time equal to two exponentiations to complete the RSA operation if parallel execution is fully used and can protect the two private primes from hardware fault attacks.