• Title/Summary/Keyword: correlation attack

Search Result 195, Processing Time 0.027 seconds

Non-Profiling Analysis Attacks on PQC Standardization Algorithm CRYSTALS-KYBER and Countermeasures (PQC 표준화 알고리즘 CRYSTALS-KYBER에 대한 비프로파일링 분석 공격 및 대응 방안)

  • Jang, Sechang;Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1045-1057
    • /
    • 2022
  • Recently, the National Institute of Standards and Technology (NIST) announced four cryptographic algorithms as a standard candidates of Post-Quantum Cryptography (PQC). In this paper, we show that private key can be exposed by a non-profiling-based power analysis attack such as Correlation Power Analysis (CPA) and Differential Deep Learning Analysis (DDLA) on CRYSTALS-KYBER algorithm, which is decided as a standard in the PKE/KEM field. As a result of experiments, it was successful in recovering the linear polynomial coefficient of the private key. Furthermore, the private key can be sufficiently recovered with a 13.0 Normalized Maximum Margin (NMM) value when Hamming Weight of intermediate values is used as a label in DDLA. In addition, these non-profiling attacks can be prevented by applying countermeasures that randomly divides the ciphertext during the decryption process and randomizes the starting point of the coefficient-wise multiplication operation.

Epidemiology and Characteristics of Recurrent Stroke : The Occurrence Type of Restroke is Similar as Previous Stroke

  • Ok, Young-Cheol;Park, Seung-Kyu;Cho, Kyu-Yong;Lim, Jun-Seob;Lee, Rae-Seop
    • Journal of Korean Neurosurgical Society
    • /
    • v.41 no.4
    • /
    • pp.224-229
    • /
    • 2007
  • Objective : Despite improvement of therapeutic regimen, incidence of stroke increases and it remains a leading cause of death. Our study aims at offering variable data on recurrent strokes. Methods : There were 59 patients who admitted from Jan. 2002 to Dec. 2004 due to recurrent strokes. A retrospective longitudinal cohort study was done. Results : Four-hundred-seventy five patients, diagnosed with acute stroke, experienced 491 strokes in 3 years, and there were 75 recurrent strokes [15.3%] in 59 patients. These 59 patients were included in the study. First hemorrhagic cases [H] were 19 [32%], and the first infarction cases [I] were 40 [68%]. Subsequent strokes after first stroke were as follows : $H{\to}H$ 14 [23.7%] cases, $H{\to}I$ 5 [8.5%], $I{\to}H$ 8 [13.6%], $I{\to}I$ 32 (54.2%]. A Cox regression analyses showed that the first type of stroke was a significant factor to the second stroke as follows : if one has had a hemorrhagic stroke, the possibility of second hemorrhagic attack ($H{\to}H$ attack) increase 3.2 times than ischemic type and in ischemic stroke [$I{\to}I$ attack] 3.6 times increased incidence of second ischemic attack. Conclusion : The recurrence rate of stroke was 12.4% [59 of 475 patients]. If the first stroke is hemorrhage or infarction, the next stroke would have high potentiality of hemorrhage, or infarction. The possibility of same type in second stroke Increase over 3 times. In $H{\to}H$ group, the time interval between first and second stroke was shorter and the age of onset was earlier than in $I{\to}I$ group. Moreover, the infarction was more frequent than hemorrhage in multiple strokes. There was a correlation in lacunar type infarction between first and second attack.

Side Channel Attack on Block Cipher SM4 and Analysis of Masking-Based Countermeasure (블록 암호 SM4에 대한 부채널 공격 및 마스킹 기반 대응기법 분석)

  • Bae, Daehyeon;Nam, Seunghyun;Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.39-49
    • /
    • 2020
  • In this paper, we show that the Chinese standard block cipher SM4 is vulnerable to the side channel attacks and present a countermeasure to resist them. We firstly validate that the secret key of SM4 can be recovered by differential power analysis(DPA) and correlation power analysis(CPA) attacks. Therefore we analyze the vulnerable element caused by power attack and propose a first order masking-based countermeasure to defeat DPA and CPA attacks. Although the proposed countermeasure unfortunately is still vulnerable to the profiling power attacks such as deep learning-based multi layer perceptron(MLP), it can sufficiently overcome the non-profiling attacks such as DPA and CPA.

Countermeasure Techniques Analysis for Power Analysis Attack (전력분석공격에 대한 대응기술 분석)

  • Kang, Young-Jin;Jo, Jung-Bok;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.221-223
    • /
    • 2014
  • Power analysis attack on cryptographic hardware device aims to study the power consumption while performing operations using secrets keys. Power analysis is a form of side channel attack which allow an attacker to compute the key encryption from algorithm using Simple Power Analysis (SPA), Differential Power Analysis (DPA) or Correlation Power Analysis (CPA). The theoretical weaknesses in algorithms or leaked informations from physical implementation of a cryptosystem are usually used to break the system. This paper describes how power analysis work and we provide an overview of countermeasures against power analysis attacks.

  • PDF

An experimental study on the evaluation of chloride attack resistance in mortar and concrete mixed with pozzolanic admixtures (포졸란계 혼화재를 혼입한 모르타르 및 콘크리트의 내염해 저항성 평가에 관한 실험적 연구)

  • 박정준;김도겸;하진규
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2000.10a
    • /
    • pp.461-466
    • /
    • 2000
  • To improve the quality of concrete, we usually consider the reduction of water/cement ratio, the increase of concrete cover depth and the use of mineral admixtures. Reportedly, the use of admixtures make concrete more durable and tighten against water. But, it is needed to study more about the relationship between the admixtures and the chloride ion diffusion. Therefore, in this study, we focused on the chloride ion diffusion properties of the pozzolanic admixtures such as fly-ash, slag and silica fume which are known as being useful on chloride attack resistance when mixed into mortar or concrete. Furthermore, we treed to analyze the correlation between mortar and concrete using the admixture, which is useful for analyzing chloride ion diffusion mechanism.

  • PDF

Flow Characteristics for Blade of Industiral Axial Blower by PIV Measurement Method (PIV 계측에 의한 산업용 송풍기 익의 유동특성)

  • Kim, J.G.;Yoon, S.B.
    • Solar Energy
    • /
    • v.19 no.3
    • /
    • pp.115-123
    • /
    • 1999
  • An experimental study was carried out to investigate the flow characteristics of a stationary blade for six kinds of measuring angles of attack, $0^{\circ},\;10^{\circ},\;20^{\circ}\;and\;30^{\circ}$ at Reynolds number of $5.8{\times}10^4$. Instant simultaneous velocity vectors around blade were measured by 2-D PIV system where laser-based illumination and two-frame grey-level cross correlation algorithm were adopted. Velocity profiles show uniform approaching flow from the straightening equipment, and experimental results reveal that separation phenomena occur and the separation point moves upstream with increasing angle of attack.

  • PDF

Robust and Reversible Image Watermarking Scheme Using Combined DCT-DWT-SVD Transforms

  • Bekkouch, Souad;Faraoun, Kamel Mohamed
    • Journal of Information Processing Systems
    • /
    • v.11 no.3
    • /
    • pp.406-420
    • /
    • 2015
  • We present a secure and robust image watermarking scheme that uses combined reversible DWT-DCT-SVD transformations to increase integrity, authentication, and confidentiality. The proposed scheme uses two different kinds of watermarking images: a reversible watermark, $W_1$, which is used for verification (ensuring integrity and authentication aspects); and a second one, $W_2$, which is defined by a logo image that provides confidentiality. Our proposed scheme is shown to be robust, while its performances are evaluated with respect to the peak signal-to-noise ratio (PSNR), signal-to-noise ratio (SNR), normalized cross-correlation (NCC), and running time. The robustness of the scheme is also evaluated against different attacks, including a compression attack and Salt & Pepper attack.

Correlation Power Analysis Attacks on the Software based Salsa20/12 Stream Cipher (소프트웨어 기반 스트림 암호 Salsa20/12에 대한 상관도 전력분석 공격)

  • Park, Young-Goo;Bae, Ki-Seok;Moon, Sang-Jae;Lee, Hoon-Jae;Ha, Jae-Cheul;Ahn, Mahn-Ki
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.35-45
    • /
    • 2011
  • The Salsa20/12 stream cipher selected for the final eSTREAM portfolio has a better performance than software implementation of AES using an 8-bit microprocessor with restricted memory space, In the theoretical approach, the evaluation of exploitable timing vulnerability was 'none' and the complexity of side-channel analysis was 'low', but there is no literature of the practical result of power analysis attack. Thus we propose the correlation power analysis attack method and prove the feasibility of our proposed method by practical experiments, We used an 8-bit RISC AVR microprocessor (ATmegal128L chip) to implement Salsa20/12 stream cipher without any countermeasures, and performed the experiments of power analysis based on Hamming weight model.

Weight Recovery Attacks for DNN-Based MNIST Classifier Using Side Channel Analysis and Implementation of Countermeasures (부채널 분석을 이용한 DNN 기반 MNIST 분류기 가중치 복구 공격 및 대응책 구현)

  • Youngju Lee;Seungyeol Lee;Jeacheol Ha
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.919-928
    • /
    • 2023
  • Deep learning technology is used in various fields such as self-driving cars, image creation, and virtual voice implementation, and deep learning accelerators have been developed for high-speed operation in hardware devices. However, several side channel attacks that recover secret information inside the accelerator using side-channel information generated when the deep learning accelerator operates have been recently researched. In this paper, we implemented a DNN(Deep Neural Network)-based MNIST digit classifier on a microprocessor and attempted a correlation power analysis attack to confirm that the weights of deep learning accelerator could be sufficiently recovered. In addition, to counter these power analysis attacks, we proposed a Node-CUT shuffling method that applies the principle of misalignment at the time of power measurement. It was confirmed through experiments that the proposed countermeasure can effectively defend against side-channel attacks, and that the additional calculation amount is reduced by more than 1/3 compared to using the Fisher-Yates shuffling method.

Empirical Study on Correlation between Performance and PSI According to Adversarial Attacks for Convolutional Neural Networks (컨벌루션 신경망 모델의 적대적 공격에 따른 성능과 개체군 희소 지표의 상관성에 관한 경험적 연구)

  • Youngseok Lee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.17 no.2
    • /
    • pp.113-120
    • /
    • 2024
  • The population sparseness index(PSI) is being utilized to describe the functioning of internal layers in artificial neural networks from the perspective of neurons, shedding light on the black-box nature of the network's internal operations. There is research indicating a positive correlation between the PSI and performance in each layer of convolutional neural network models for image classification. In this study, we observed the internal operations of a convolutional neural network when adversarial examples were applied. The results of the experiments revealed a similar pattern of positive correlation for adversarial examples, which were modified to maintain 5% accuracy compared to applying benign data. Thus, while there may be differences in each adversarial attack, the observed PSI for adversarial examples demonstrated consistent positive correlations with benign data across layers.