Protecting secret keys with table encoding against power analysis attacks부채널 전력 분석 공격에 안전한 테이블 인코딩을 기반으로 하는 비밀키 보호 기법에 관한 연구

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 444
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisorYoon, Hyun-Soo-
dc.contributor.advisor윤현수-
dc.contributor.authorKim, Tae-Sung-
dc.contributor.author김태성-
dc.date.accessioned2018-05-23T19:38:20Z-
dc.date.available2018-05-23T19:38:20Z-
dc.date.issued2017-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=675851&flag=dissertationen_US
dc.identifier.urihttp://hdl.handle.net/10203/242076-
dc.description학위논문(박사) - 한국과학기술원 : 전산학부, 2017.2,[v, 59 p :]-
dc.description.abstractSide channel attack exploits the fact that the implementations of cryptographic algorithms leak information about the secret key. Power analysis attack makes use of power consumption of the target device for leakage information with respect to secret data. Power analysis attack falls into two types: simple power analysis (SPA) and differential power analysis (DPA). In SPA, an attacker observes patterns of power consumption to find secret data or to locate a target operation. DPA attack hypothesizes the intermediate values of all key candidates and recovers the secret key with statistical process to the power consumption. One of the strong points of DPA is that it does not require any detailed information about the implementation to reveal the secret data. Masking is a widely used countermeasure to thwart the powerful DPA attacks. It makes the attacker fail to reveal secret data via randomizing intermediate values which are related to secret data in crypto implementation. A first-order masking which uses only one mask is vulnerable to a second-order DPA which exploits two intermediate values to cancel out the mask using arithmetic operations. To circumvent this second order DPA, a second-order masking is necessary, but it is sometimes hundreds of times slower than a straightforward implementation. This is the main reason this cannot be adopted in practical applications. In this thesis, we propose a new countermeasure scheme to resist power analysis attack. Our scheme randomizes all the intermediate values of a block cipher by encoding primitives of a cryptographic algorithm to lookup tables and makes the transformed implementation resistant to power analysis attack. We apply our scheme to well-known block cipher, HIGHT and AES. Our protected implementation of HIGHT takes only 1.79 times compared to the straightforward implementation, and it needs 25 Kbytes memory space to store lookup tables.-
dc.languageeng-
dc.publisher한국과학기술원-
dc.subjectCryptography-
dc.subjectSymmetric cryptographic algorithm-
dc.subjectSide channel attack-
dc.subjectDifferential power analysis-
dc.subjectSide channel attack countermeasure-
dc.subjectTable encoding-
dc.subject암호-
dc.subject대칭 암호 알고리즘-
dc.subject부채널 공격-
dc.subject차분 전력 분석-
dc.subject부채널 공격 대응-
dc.subject테이블 인코딩-
dc.titleProtecting secret keys with table encoding against power analysis attacks-
dc.title.alternative부채널 전력 분석 공격에 안전한 테이블 인코딩을 기반으로 하는 비밀키 보호 기법에 관한 연구-
dc.typeThesis(Ph.D)-
dc.identifier.CNRN325007-
dc.description.department한국과학기술원 :전산학부,-
Appears in Collection
CS-Theses_Ph.D.(박사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0