고차 전력분석공격에 대응하는 블록 암호 알고리즘ARIA의 암호화 방법
    1.
    发明授权

    公开(公告)号:KR100834096B1

    公开(公告)日:2008-06-02

    申请号:KR1020070045917

    申请日:2007-05-11

    Abstract: An ARIA(Academy Research Institute Agency) encryption method for counter-measuring a high order DPA is provided to improve a speed by applying a function calculation method only to a first round and the last round. A calculation process is performed by applying d mask values to an input plane text and a round key. A mask value calculation process is performed to calculate the mask values by updating Sbox in the substitution layer. A masking value calculation process is performed in a diffusion layer for composing a round function. The calculation process includes a process for generating random masks of R1 to Rd, a process for initializing an output values, RX to which the d random masks are applied, and a process for performing a masking calculation process for the input plain text and the round key.

    Abstract translation: 提供用于对高阶DPA进行反向测量的ARIA(Academy Research Institute Agency)加密方法,以通过仅对第一轮和最后一轮应用函数计算方法来提高速度。 通过将d个掩模值应用于输入平面文本和圆键来执行计算处理。 执行掩模值计算处理以通过更换替换层中的Sbox来计算掩模值。 在用于组合循环函数的扩散层中执行掩蔽值计算处理。 计算处理包括用于生成R1到Rd的随机掩码的处理,用于初始化输出值的过程,应用d随机掩码的RX以及用于对输入的纯文本和轮进行掩蔽计算处理的处理 键。

    2차 차분 전력분석 공격 방법 및 2차 차분 전자기분석 공격방법
    2.
    发明公开
    2차 차분 전력분석 공격 방법 및 2차 차분 전자기분석 공격방법 有权
    二阶差分功率分析攻击方法和二阶差分电磁分析攻击方法

    公开(公告)号:KR1020090065273A

    公开(公告)日:2009-06-22

    申请号:KR1020070132759

    申请日:2007-12-17

    Abstract: A second-order differential power analysis attack method and a second-order differential electromagnetic analysis attack method are provided to be applied to an encoding apparatus in which a plurality of intermediate values is parallel processed. A power consumption of an encoding apparatus is measured(301). The measured power consumption is processed by using a pre-process function(302). A plurality of intermediate values about each presumed key is calculated by inputting a plurality of presumed keys to an estimated model(303). A power consumption corresponding to each presumed key is estimated by using the intermediate values. A correlation coefficient between the pre-processed power consumption and the estimated power consumption is calculated(304). A key used in the encoding apparatus among the presumed keys is determined by using the correlation coefficient(305).

    Abstract translation: 提供二阶微分功率分析攻击方法和二阶微分电磁分析攻击方法,以应用于并行处理多个中间值的编码装置。 测量编码装置的功耗(301)。 通过使用预处理功能(302)处理所测量的功率消耗。 通过将多个推测密钥输入到估计模型(303)来计算关于每个推定密钥的多个中间值。 通过使用中间值来估计对应于每个假设密钥的功耗。 计算预处理功率消耗与估计功耗之间的相关系数(304)。 通过使用相关系数(305)来确定推定密钥中的编码装置中使用的密钥。

    2차 차분 전력분석 공격 방법 및 2차 차분 전자기분석 공격방법
    4.
    发明授权
    2차 차분 전력분석 공격 방법 및 2차 차분 전자기분석 공격방법 有权
    2차차분전력분석공격방법및2차차분전자기분석공격방2

    公开(公告)号:KR100926749B1

    公开(公告)日:2009-11-16

    申请号:KR1020070132759

    申请日:2007-12-17

    Abstract: A second-order differential power analysis attack method and a second-order differential electromagnetic analysis attack method are provided to be applied to an encoding apparatus in which a plurality of intermediate values is parallel processed. A power consumption of an encoding apparatus is measured(301). The measured power consumption is processed by using a pre-process function(302). A plurality of intermediate values about each presumed key is calculated by inputting a plurality of presumed keys to an estimated model(303). A power consumption corresponding to each presumed key is estimated by using the intermediate values. A correlation coefficient between the pre-processed power consumption and the estimated power consumption is calculated(304). A key used in the encoding apparatus among the presumed keys is determined by using the correlation coefficient(305).

    Abstract translation: 提供二阶微分功率分析攻击方法和二阶微分电磁分析攻击方法,以将其应用于并行处理多个中间值的编码设备。 测量编码设备的功耗(301)。 测量的功耗通过使用预处理功能来处理(302)。 通过将多个假定密钥输入到估计模型来计算关于每个假定密钥的多个中间值(303)。 通过使用中间值来估计与每个推测密钥对应的功耗。 计算预处理功耗与估计功耗之间的相关系数(304)。 通过使用相关系数(305)来确定推测密钥中的编码装置中使用的密钥。

    SEED 암호화에서 차분 전력 분석 공격을 방어하기 위한 마스킹 방법
    5.
    发明公开
    SEED 암호화에서 차분 전력 분석 공격을 방어하기 위한 마스킹 방법 有权
    用于保护种子功率分析攻击的掩蔽方法

    公开(公告)号:KR1020110008418A

    公开(公告)日:2011-01-27

    申请号:KR1020090065769

    申请日:2009-07-20

    CPC classification number: H04L9/0618 H04L9/003 H04L2209/043

    Abstract: PURPOSE: A masking method for protecting power analysis attacks is provided to reduce operation quantity needed for masking operation. CONSTITUTION: An inverse table is generated(S510). A first and a second conversion tables for an additional conversion according to the use of the inverse table is generated. 6 one-bite mask values and 2 four-bits mask values required for the masking are generated(S530). The inverse table is masked with the new mask value. The masking inverse table is generated(S550). A masking S box is composed using the masking inverse table, and the first and the second conversion table(S570).

    Abstract translation: 目的:提供用于保护功率分析攻击的掩蔽方法,以减少屏蔽操作所需的操作量。 构成:生成反向表(S510)。 产生用于根据逆表的使用的附加转换的第一和第二转换表。 生成屏蔽所需的6个单面掩模值和2个4位掩模值(S530)。 逆表被新的掩码值屏蔽。 产生掩蔽反转表(S550)。 使用掩蔽反向表和第一和第二转换表(S570)组合屏蔽S盒。

Patent Agency Ranking