본문 바로가기 주메뉴 바로가기
국회도서관 홈으로 정보검색 소장정보 검색

결과 내 검색

동의어 포함

초록보기

RSA signature algorithms using the Chinese remaindertheorem (CRT-RSA) are approximately four-times fasterthan straightforward implementations of an RSAcryptosystem. However, the CRT-RSA is known to bevulnerable to fault attacks; even one execution of thealgorithm is sufficient to reveal the secret keys. Over thepast few years, several countermeasures against CRT-RSAfault attacks have tended to involve additionalexponentiations or inversions, and in most cases, they arealso vulnerable to new variants of fault attacks. In thispaper, we review how Shamir’s countermeasure can bebroken by fault attacks and improve the countermeasureto prevent future fault attacks, with the added benefit oflow additional costs. In our experiment, we use the sidechannelanalysis resistance framework system, a faultinjection testing and verification system, which enables usto inject a fault into the right position, even to within 1 μs.

We also explain how to find the exact timing of the targetoperation using an Atmega128 software board.

권호기사

권호기사 목록 테이블로 기사명, 저자명, 페이지, 원문, 기사목차 순으로 되어있습니다.
기사명 저자명 페이지 원문 목차
A Compact C-Band 50 W AlGaN/GaN High-Power MMIC Amplifier for Radar Applications Jin-Cheol Jeong, Dong-Pil Jang, Byoung-Gon Han, In-Bok Yom pp.498-501

A Model-Based Image Steganography Method Using Watson's Visual Model Mohammad Fakhredanesh, Reza Safabakhsh, Mohammad Rahmati pp.479-489

Early Coding Unit-Splitting Termination Algorithm for High Efficiency Video Coding(HEVC) Kalyan Goswami, Byung-Gyu Kim, Dongsan Jun, Soon-Heung Jung, Jin Soo Choi pp.407-417

Domain-Adaptation Technique for Semantic Role Labeling with Structural Learning Soojong Lim, 이창기, 류법모, Sang Kyu Park, Dongyul Ra pp.429-438

High Performance Millimeter-Wave Image Reject Low-Noise Amplifier Using Inter-stage Tunable Resonators Jihoon Kim, Youngwoo Kwon pp.510-513

Intra- and Inter-frame Features for Automatic Speech Recognition Sung Joo Lee, Byung Ok Kang, Hoon Chung, Yunkeun Lee pp.514-517

Joint Estimation of TOA and DOA in IR-UWB System Using Sparse Representation Framework Fangqiu Wang, Xiaofei Zhang pp.460-468

Predicting the Lifespan and Retweet Times of Tweets Based on Multiple Feature Analysis Yongjin Bae, 류법모, Hyunki Kim pp.418-428

Robust Energy Efficiency Power Allocation for Uplink OFDM-Based Cognitive Radio Networks Jiakuo Zuo, Van Phuong Dao, Yongqiang Bao, Shiliang Fang, Li Zhao, Cairong Zou pp.506-509

Study of Capacitive Tilt Sensor with Metallic Ball Chang Hwa Lee, Seung Seob Lee pp.361-366

Time-Slotted Scheduling Schemes for Multi-hop Concurrent Transmission in WPANs with Directional Antenna Muhammad Bilal, Moonsoo Kang, Sayed Chhattan Shah, Shin-Gak Kang pp.374-384

A 900 MHz Zero-IF RF Transceiver for IEEE 802.15.4g SUN OFDM Systems Changwan Kim, Seungsik Lee, Sangsung Choi pp.352-360

Cluster-Based Polarized Spectrum Sharing in Channels with Polarization Mode Dispersion Dongming Li, Zhimin Zeng, Caili Guo, Xiaolin Lin pp.502-505

Characterization of Fluxing and Hybrid Underfills with Micro-encapsulated Catalyst for Long Pot Life Yong-Sung Eom, Ji-Hye Son, Keon-Soo Jang, Hak-Sun Lee, Hyun-Cheol Bae, Kwang-Seong Choi, Heung-Soap Choi pp.343-351

OFEX Controller to Improve Queueing and User Performance in Multi-bottleneck Networks Jungang Liu, Oliver W.W. Yang pp.396-406

Data Clustering Method Using a Modified Gaussian Kernel Metric and Kernel PCA Hansung Lee, Jang-Hee Yoo, Daihee Park pp.333-342

Improved Shamir's CRT-RSA Algorithm : Revisit with the Modulus Chaining Method Seungkwang Lee, Dooho Choi, Yongje Choi pp.469-478

New Path-Setup Method for Optical Network-on-Chip Huaxi Gu, Kai Gao, Zhengyu Wang, Yintang Yang, Xiaoshan Yu pp.367-373

State Machine and Downhill Simplex Approach for Vision-Based Nighttime Vehicle Detection Kyoung-Ho Choi, Do-Hyun Kim, Kwang-Sup Kim, Jang-Woo Kwon, Sang-Il Lee, Ken Chen, Jong-Hyun Park pp.439-449

Relationship between Service-Related Activities, Service Capability and Market Diffusion : Case of WiBro Moon-Koo Kim, Jong-Hyun Park, Jong-Hyun Paik pp.490-497

Resource Allocation Scheme for Millimeter Wave-Based WPANs Using Directional Antennas Meejoung Kim, Yongsun Kim, Wooyong Lee pp.385-395

Single Image-Based 3D Tree and Growth Models Reconstruction Jaehwan Kim, Il-Kwon Jeong pp.450-459

참고문헌 (20건) : 자료제공( 네이버학술정보 )

참고문헌 목록에 대한 테이블로 번호, 참고문헌, 국회도서관 소장유무로 구성되어 있습니다.
번호 참고문헌 국회도서관 소장유무
1 Differential Fault Analysis for Round‐Reduced AES by Fault Injection 소장
2 J. Blomer, M. Otto, and J.-P. Seifert, “A New CRT-RSA Algorithm Secure Against Bellcore Attacks,” Tenth ACM Conf. Comput. Commun. Security, Washington, DC, USA, Oct. 27–30, 2003, pp. 311–320. 미소장
3 J. Blomer and M. Otto, “Wagner’s Attack on a Secure CRT-RSA Algorithm Reconsidered,” Third Int. Conf. Fault Diagnosis Tolerance Cryptography, Yokohama, Japan, 2006, pp. 13–23. 미소장
4 C. Aumuller et al., “Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures,” Cryptographic Hardware Embedded Syst., Redwood Shores, CA, USA, Aug. 13–15, 2002, pp. 260–275. 미소장
5 A. Boscher, H. Handschuh, and E. Trichina, Fault Resistant RSA Signatures: Chinese Remaindering in Both Directions. Accessed Mar. 31, 2014. http://eprint.iacr.org/2010/038 미소장
6 D. Vigilant, “RSA with CRT: A New Cost-Effective Solution to Thwart Fault Attacks,” Tenth Int. Conf. Cryptographic Hardware Embedded Syst., Washington, DC, USA, Aug. 10–13, 2008, pp. 130–145. 미소장
7 RSA speedup with Chinese remainder theorem immune against hardware fault cryptanalysis 네이버 미소장
8 D. Wagner, “Cryptanalysis of a Provably Secure CRT-RSA Algorithm,” Eleventh ACM Conf. Comput. Commun. Security, Washington, DC, USA, Oct. 25–29, 2004, pp. 92–97. 미소장
9 S.-K. Kim et al., “An Efficient CRT-RSA Algorithm Secure against Power and Fault Attacks,” J. Syst. Software, vol. 84, no. 10, Oct. 2011, pp. 1660–1669. 미소장
10 S.-M. Yen, D. Kim, and S.J. Moon, “Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection,” Third Int. Conf. Fault Diagnosis Tolerance Cryptography, Yokohama, Japan, vol. 4236, 2006, pp. 53–61. 미소장
11 J.-S. Coron et al., “Fault Attacks and Countermeasures on Vigilant’s RSA-CRT Algorithm,” Seventh Int. Conf. Fault Diagnosis Tolerance Cryptography, Santa Babara, CA, USA, Aug. 21, 2010, pp. 89–96. 미소장
12 D. Boneh, R.A. DeMillo, and R.J. Lipton, “On the Importance of Checking Cryptographic Protocols for Faults,” Advances in Cryptology Sixteenth Annual Int. Conf. Theory Appl. Cryptographic Tech., Konstanz, Germany, May 11–15, 1997, pp. 37–51. 미소장
13 A. Shamir, Improved Method and Apparatus for Protecting Public Key Schemes from Timing and Fault Attacks, US Patent 5,991,415, filed May 12, 1997, issued Nov. 23, 1999. 미소장
14 C. Giraud, “An RSA Implementation Resistant to Fault Attacks and to Simple Power Analysis,” IEEE Trans. Comput., vol. 55, no. 9, Sept. 2006, pp. 1116–1120. 미소장
15 S.-M. Yen et al., “RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis,” Fourth Int. Conf. Info. Security Cryptology, Seoul, Rep. of Korea, Dec. 6–7, 2001, pp. 397–413. 미소장
16 S.-K. Kim et al., “An Efficient CRT-RSA Algorithm Secure against Power and Fault Attacks,” J. Syst. Softw., vol. 84, no. 10, Oct. 2011, pp. 1660–1669. 미소장
17 A. Boscher, R. Naciri, and E. Prouff, “CRT RSA Algorithm Protected against Fault Attacks,” First Workshop Info. Security Theory Practice, Crete, Greece, May 9–11, 2007, pp. 229–243. 미소장
18 M. Ciet and M. Joye, “Practical Fault Countermeasures for Chinese Remaindering Based RSA,” Second Int. Conf. Fault Diagnosis Tolerance Cryptography, Scotland, UK, Sept. 2, 2005, pp. 124–131. 미소장
19 ISO 7816, “Identification Cards Integrated Circuit(s) Cards with Contacts,” Geneva, Switzerland, Created in 1989, amended in 1992. 미소장
20 Atmega 128 specification. Accessed Mar. 31, 2014. http://www. atmel.com/Images/doc2467.pdf 미소장