Abstract:
A side channel analysis apparatus based on a profile includes a waveform collection unit configured to collect leaked information from a target device of a side channel analysis; and a preprocessing unit configured to preprocess a waveform data correspond to the leaked information collected from the waveform collection unit before analyzing same. Further, the side channel analysis apparatus includes an analysis unit configured to analyze the waveform data preprocessed in the preprocessing unit; and a profile configuration unit configured to make each process of the waveform collection unit, the preprocessing unit, and the analysis unit into a process and configure a profile for managing each process by connection of each process.
Abstract:
Disclosed is a function masking apparatus in a symmetric cryptographic algorithm for preventing side channel attacks, including: a controller creating lookup tables for one or more internal functions included in a high security and light weight (HIGHT) algorithm, respectively based on a plurality of non-linear functions, a plurality of linear functions, and a plurality of constants which are randomly generated; and a storage unit storing the lookup tables for one or more internal functions included in the generated HIGHT algorithm.
Abstract:
Disclosed is a method of generating secret information on the basis of a ring oscillator. According to an embodiment of the present disclosure, there is provided an apparatus for generating secret information on the basis of a ring oscillator, the apparatus including: multiple PUF information generation units each including at least one ring oscillator cell and generating physically unclonable function (PUF) information generated by the at least one ring oscillator cell; a phase checking unit cross-checking phases for the multiple pieces of the PUF information that are output from the multiple PUF information generation units, respectively; and a secret key generation unit outputting secret key information based on a result of comparing the multiple phases received from the phase checking unit.
Abstract:
In accordance with an embodiment, the logical exclusive operation on the random number RAND and the OPc value are performed several times, the logical operation and encryption processing using a random number RAND and logical operation and encryption processing using a random number S are done in any order, which brings an increase of an attack complexity as to whether to calculate the correlation coefficient from the power consumption waveform at any point when analyzing the correlation power, whereby it is possible to defend the CPA attack effectively.