• 제목/요약/키워드: attacks and countermeasures

검색결과 207건 처리시간 0.034초

Differential Power Analysis on Countermeasures Using Binary Signed Digit Representations

  • Kim, Tae-Hyun;Han, Dong-Guk;Okeya, Katsuyuki;Lim, Jong-In
    • ETRI Journal
    • /
    • 제29권5호
    • /
    • pp.619-632
    • /
    • 2007
  • Side channel attacks are a very serious menace to embedded devices with cryptographic applications. To counteract such attacks many randomization techniques have been proposed. One efficient technique in elliptic curve cryptosystems randomizes addition chains with binary signed digit (BSD) representations of the secret key. However, when such countermeasures have been used alone, most of them have been broken by various simple power analysis attacks. In this paper, we consider combinations which can enhance the security of countermeasures using BSD representations by adding additional countermeasures. First, we propose several ways the improved countermeasures based on BSD representations can be attacked. In an actual statistical power analysis attack, the number of samples plays an important role. Therefore, we estimate the number of samples needed in the proposed attack.

  • PDF

WSN의 네트워크 계층에서의 공격과 탐지 및 대응 방안 (Attacks, Detection, and Countermeasures in WSN Network Layer)

  • 이다은;이유진
    • 전기전자학회논문지
    • /
    • 제23권2호
    • /
    • pp.413-418
    • /
    • 2019
  • 기존의 센서 네트워크 상의 공격에는 Sniffing(도청) 공격, Flood 공격, Spoofing(위조)공격 등이 있고, 이에 대한 기본적인 대응 방법에는 암호화 및 인증 방법, 스위칭 방법 등이 있다. 무선 센서 네트워크(WSN)에서 네트워크 계층에서의 공격에는 Wormhole 공격, HELLO Flood 공격, Sybil 공격, 싱크홀 공격, 선택적 전달 공격 등이 있다. 이러한 공격들은 앞서 말한 기본적인 대응방안으로 방어 되지 않는 경우가 있다. 이러한 공격들에 대한 새로운 대응방안에는 정기적인 키 변경, 정기적인 네트워크 모니터링 등의 여러 가지 방안들이 있다. 본 논문에서는 무선 센서 네트워크의 네트워크 계층의 여러 가지 위협(공격)들과 그에 따른 새로운 대응방안들에 대해 제시한다.

암호공격에 안전한 Koblitz 타원곡선 암호시스템의 스칼라 곱셈 알고리즘 (A Scalar Multiplication Algorithm Secure against Side-Channel Attacks for Koblitz Curve Cryptosystems)

  • 장용희;고본직사;고목일의;권용진
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2006년도 하계학술대회
    • /
    • pp.356-360
    • /
    • 2006
  • Recently, many power analysis attacks have been proposed. Since the attacks are powerful, it is very important to implement cryptosystems securely against the attacks. We propose countermeasures against power analysis attacks for elliptic curve cryptosystems based on Koblitz curves (KCs), which are a special class of elliptic curves. That is, we make our countermeasures be secure against SPA, DPA, and new DPA attacks, specially RPA, ZPA, using a random point at each execution of elliptic curve scalar multiplication. And since our countermeasures are designed to use the Frobenius map of KC, those are very fast.

  • PDF

Attacks on and Countermeasures for an RFID Mutual Authentication Scheme in Pervasive Computing Environment

  • Mohaisen, Abedelaziz;Chang, Ku-Young;Hong, Do-Won
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권9호
    • /
    • pp.1684-1697
    • /
    • 2011
  • We show that two protocols for RFID mutual authentication in pervasive computing environments, recently proposed by Kang et al, are vulnerable to several attacks. First, we show these protocols do not preserve the privacy of users' location. Once a tag is authenticated successfully, we show several scenarios where legitimate or illegitimate readers can trace the location of that tag without any further information about the tag's identifier or initial private key. Second, since the communication between readers and the database takes place over an insecure communication channel and in the plaintext form, we show scenarios where a compromised tag can gain access to confidential information that the tag is not supposed get access to. Finally, we show that these protocols are also vulnerable to the replay and denial-of-service attacks. While some of these attacks are due to simple flaws and can be easily fixed, others are more fundamental and are due to relaxing widely accepted assumptions in the literature. We examine this issue, apply countermeasures, and re-evaluate the protocols overhead after taking these countermeasures into account and compare them to other work in the literature.

ECC 프로세서에 대한 부채널 공격 및 대응방안 동향 (A Survey on Side-Channel Attacks and Countermeasures for ECC Processor)

  • 정영수;신경욱
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2022년도 추계학술대회
    • /
    • pp.101-103
    • /
    • 2022
  • 타원곡선 암호 (elliptic curve cryptography; ECC)는 효율적인 하드웨어 구현이 가능하면서 높은 보안 강도를 가져 오늘날 IoT 기기나 V2X 통신의 공개키 보안 하드웨어 구현에 폭넓게 사용되고 있다. 그러나 ECC 기반의 공개키 보안 시스템은 부채널 공격 (side channel attacks; SCA)에 대한 일부 보안 취약점을 갖는 것으로 알려지고 있어 ECC 프로세서 설계 시 보안공격에 대한 대응 방법의 적용이 필요하다. 본 논문에서는 부채널 공격 유형과 ECC 프로세서 설계에 적용할 수 있는 부채널 공격 대응 방안에 대해 알아본다.

  • PDF

Power Analysis Attacks and Countermeasures on NTRU-Based Wireless Body Area Networks

  • Wang, An;Zheng, Xuexin;Wang, Zongyue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권5호
    • /
    • pp.1094-1107
    • /
    • 2013
  • NTRU cryptosystem has been suggested for protecting wireless body area networks, which is secure in the sense of traditional cryptanalysis. In this paper, we fulfill the first power analysis attack on the ultra-low-power environment of wireless body area networks. Specifically, two practical differential power analyses on NTRU algorithm are proposed, which can attack the existing countermeasures of NTRU. Accordingly, we suggest three countermeasures against our attacks. Meanwhile, practical experiments show that although the attacks in this paper are efficient, our countermeasures can resist them effectively.

The Wormhole Routing Attack in Wireless Sensor Networks (WSN)

  • Sharif, Lukman;Ahmed, Munir
    • Journal of Information Processing Systems
    • /
    • 제6권2호
    • /
    • pp.177-184
    • /
    • 2010
  • Secure routing is vital to the acceptance and use of Wireless Sensor Networks (WSN) for many applications. However, providing secure routing in WSNs is a challenging task due to the inherently constrained capabilities of sensor nodes. Although a wide variety of routing protocols have been proposed for WSNs, most do not take security into account as a main goal. Routing attacks can have devastating effects on WSNs and present a major challenge when designing robust security mechanisms for WSNs. In this paper, we examine some of the most common routing attacks in WSNs. In particular, we focus on the wormhole routing attack in some detail. A variety of countermeasures have been proposed in the literature for such attacks. However, most of these countermeasures suffer from flaws that essentially render them ineffective for use in large scale WSN deployments. Due to the inherent constraints found in WSNs, there is a need for lightweight and robust security mechanisms. The examination of the wormhole routing attack and some of the proposed countermeasures makes it evident that it is extremely difficult to retrofit existing protocols with defenses against routing attacks. It is suggested that one of the ways to approach this rich field of research problems in WSNs could be to carefully design new routing protocols in which attacks such as wormholes can be rendered meaningless.

Higher-Order Countermeasures against Side-Channel Cryptanalysis on Rabbit Stream Cipher

  • Marpaung, Jonathan A.P.;Ndibanje, Bruce;Lee, Hoon Jae
    • Journal of information and communication convergence engineering
    • /
    • 제12권4호
    • /
    • pp.237-245
    • /
    • 2014
  • In this study, software-based countermeasures against a side-channel cryptanalysis of the Rabbit stream cipher were developed using Moteiv's Tmote Sky, a popular wireless sensor mote based on the Berkeley TelosB, as the target platform. The countermeasures build upon previous work by improving mask generation, masking and hiding other components of the algorithm, and introducing a key refreshment scheme. Our contribution brings improvements to previous countermeasures making the implementation resistant to higher-order attacks. Four functional metrics, namely resiliency, robustness, resistance, and scalability, were used for the assessment. Finally, performance costs were measured using memory usage and execution time. In this work, it was demonstrated that although attacks can be feasibly carried out on unprotected systems, the proposed countermeasures can also be feasibly developed and deployed on resource-constrained devices, such as wireless sensors.

북한의 사이버공격과 대응방안에 관한 연구 (A Study on North Korea's Cyber Attacks and Countermeasures)

  • 정민경;임종인;권헌영
    • 한국IT서비스학회지
    • /
    • 제15권1호
    • /
    • pp.67-79
    • /
    • 2016
  • This study aims to present the necessary elements that should be part of South Korea's National Defense Strategy against the recent North Korean cyber-attacks. The elements proposed in this study also reflect the recent trend of cyber-attack incidents that are happening in the Unites States and other countries and have been classified into the three levels of cyber incidents: cyberwarfare, cyberterrorism and cybercrime. As such, the elements proposed are presented in accordance with this classification system. In order to properly take into account the recent trend of cyber-attacks perpetrated by North Korea, this paper analyzed the characteristics of recent North Korean cyber-attacks as well as the countermeasures and responses of South Korea. Moreover, by making use of case studies of cyber-attack incidents by foreign nations that threaten national security, the response measures at a national level can be deduced and applied as in this study. Thus, the authors of this study hope that the newly proposed elements here within will help to strengthen the level of Korea's cyber security against foreign attacks, specifically that of North Korea such as the KHNP hacking incidents and so on. It is hoped that further damage such as leakage of confidential information, invasion of privacy and physical intimidation can be mitigated.

트래픽 분석을 통한 DDoS 공격에 대한 대응책 연구 (DDoS attack traffic through the analysis of responses to research)

  • 홍성혁
    • 중소기업융합학회논문지
    • /
    • 제4권3호
    • /
    • pp.1-6
    • /
    • 2014
  • DDoS (Distributed Denial Service, 분산 서비스) 공격이 인터넷에서 대하여 끊임없는 위협이 발생되고 있으며, 이에 대한 대응책들이 제시 되었다. 그러나 다양한 공격과 복잡한 공격으로 어떠한 대응법이 효과적인지도 상당히 문제점이 되었다. 공격자들은 이러한 대응에 대해 하기 위하여 꾸준한 공격도구를 변경하고 있으며, 이에 대한 대응책으로써 전문가들 역시 새로운 공격에 대해 끊임없이 연구를 하고 있다. 따라서 본 논문은 DDoS의 최근의 대표적인사례인 7.7DDoS와 3.3DDoS에 대해 살펴보고 기존 DDoS 공격유형인 PPS 증가 공격, 대용량 트래픽 전송, 웹 서비스 지연과 라우터와 방화벽 설정으로 대응방안을 소개하고, 응용프로그램과 인증제도에 의한 DDoS 대응책 연구를 기술하여, 앞으로의 DDoS 공격에 효과적으로 방안할 수 있도는 방법을 제시하였다.

  • PDF