KR101852546B1 - System and Method for Distinguishing Block Cipher SEED when Operating Financial IC Card - Google Patents
System and Method for Distinguishing Block Cipher SEED when Operating Financial IC Card Download PDFInfo
- Publication number
- KR101852546B1 KR101852546B1 KR1020170098194A KR20170098194A KR101852546B1 KR 101852546 B1 KR101852546 B1 KR 101852546B1 KR 1020170098194 A KR1020170098194 A KR 1020170098194A KR 20170098194 A KR20170098194 A KR 20170098194A KR 101852546 B1 KR101852546 B1 KR 101852546B1
- Authority
- KR
- South Korea
- Prior art keywords
- waveform
- seed
- financial
- random
- plain text
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
- G06Q20/38215—Use of certificates or encrypted proofs of transaction rights
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/003—Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Abstract
The present invention relates to a device for classifying SEED computation of a block encryption algorithm in a financial IC card, which enables the block cipher algorithm SEED to be clearly distinguished in safety verification of subchannel analysis by specifying the last byte of the plain text in the financial IC card protocol as 0x80 Method for performing subchannel safety verification on a financial IC card, a waveform (P1) obtained by transmitting a random 16-byte plain text in which the last byte is not 0x80 in the financial IC card protocol, and a random (P3) for distinguishing the block encryption algorithm SEED by using the difference between the waveform (P2) obtained by transmitting the 15 bytes and the last byte 0x80 plain text.
Description
The present invention relates to an efficient safety verification technique for subchannel analysis and more specifically to a block encryption algorithm SEED computation in a financial IC card to clearly distinguish a block cipher algorithm SEED at the time of verifying safety against a sub- And more particularly,
Side Channel Analysis (SCA) is an analysis technique first proposed by Paul Kocher in 1996. It is an analytical technique in which a cryptographic device finds a key using physical information exposed by a cryptographic algorithm.
Financial IC card ciphertext data generation procedure is reported to be vulnerable to such subchannel analysis, and it is possible to replicate financial IC card when searching master key.
Therefore, research on the process of generating the financial IC card ciphertext data secure in the subchannel analysis has been actively conducted.
The financial IC card provides security and reliability of the system by performing SEED of 128 bits symmetric key block encryption algorithm three times.
That is, a session key is generated by performing two SEEDs with a master key, a card random number, and a terminal random number as inputs. The plaintext is encrypted using the generated session key and output.
In such a technology, it is necessary to efficiently distinguish a block cipher algorithm SEED operation when a block cipher algorithm SEED operation is performed in a domestic financial IC card.
In accordance with the financial IC card standard (CFIP.ST.FINIC-02-2014 document) issued by the Financial Information Promotion Council, all domestic financial IC cards shall comply with them.
The domestic financial IC card protocol is implemented as shown in FIG. 1 by the financial IC card standard (CFIP.ST.FINIC-02-2014 document) issued by the Financial Information Promotion Council.
1 is a block diagram showing a domestic financial IC card protocol.
Based on this, subchannel safety verification for domestic financial IC card is performed.
In a typical case, a virtual ATM and a user are configured and an arbitrary terminal random number and an arbitrary account password are transmitted to the card.
Since the key to perform the subchannel verification is the first SEED receiving the card random number, the terminal random number and the account password inserted as the inputs of the second and third SEEDs are transmitted or fixed with arbitrary random number 16 bytes.
In general, the waveforms of the second and third SEEDs are not directly used in the subchannel safety verification, but the SEED 3 times in the domestic financial IC card protocol can be easily recognized by the standards.
In other words, as a simple power analysis (SPA) which is one of the important steps in the subchannel analysis, three patterns of the same pattern are found and a waveform is collected for the first SEED.
Thus, the second and third SEEDs do not directly affect the waveform acquisition, but they play an important role in distinguishing the first SEED.
However, in reality, there are a lot of three patterns in the waveforms within the financial IC protocol.
In other words, finding the first SEED within the domestic financial IC card protocol waveform is not easy even for a skilled sub-channel analyst.
Therefore, it is required to develop a new technology that can clearly distinguish the block cipher algorithm SEED when verifying the safety for subchannel analysis.
The present invention solves the problem of safety verification for the subchannel analysis of the domestic financial IC card protocol of the related art. The present invention provides a financial IC The present invention provides a device and method for distinguishing a block encryption algorithm in a card by a SEED algorithm.
The present invention distinguishes waveforms by the number of SEED operations induced when the last byte of 16 bytes of plain text is fixed at 0x80 and fixed at terminal by financial IC card standard (CFIP.ST.FINIC-02-2014 document) The present invention provides a device and method for distinguishing a block encryption algorithm SEED calculation in a financial IC card so as to increase safety for subchannel analysis.
The present invention relates to a device for classifying SEED computation of a block encryption algorithm in a financial IC card, which enables the block cipher algorithm SEED to be clearly distinguished in safety verification of subchannel analysis by specifying the last byte of the plain text in the financial IC card protocol as 0x80 The purpose of the method is to provide.
The present invention utilizes a change in the number of block encryption algorithm SEED operations in a financial IC card according to the 16-byte transmission format of a plain text in a terminal, thereby enhancing the safety of the sub-channel analysis. The present invention provides a device and method for distinguishing a block encryption algorithm SEED calculation in a financial IC card that can be utilized by domestic and overseas card companies that design a countermeasure against a financial IC card.
The objects of the present invention are not limited to the above-mentioned objects, and other objects not mentioned can be clearly understood by those skilled in the art from the following description.
In order to achieve sub-channel safety verification for a financial IC card, an apparatus for classifying a block encryption algorithm SEED calculation in a financial IC card according to the present invention for achieving the above object is a system in which a last byte in a financial IC card protocol is not 0x80 A plain text transmission unit for transmitting a random 16-byte plain text, a SEED classification determination unit for performing a SEED computation by performing a protocol and determining whether a block encryption algorithm is SEED classification, A SEED discriminating unit for discriminating a block cipher algorithm SEED if the SEED discrimination judging unit determines that the block cipher algorithm SEED can not be classified; A byte value fixing unit for fixing the byte value; And a waveform difference determiner for determining whether there is a waveform difference by performing a SEED operation on the random 15 bytes transmitted through the plain text transmitter and the last byte 0x80 plain text.
In order to perform subchannel safety verification for a financial IC card, a device for discriminating a block encryption algorithm in a financial IC card according to the present invention for achieving another object, A P2 waveform acquiring unit for extracting a waveform P2 obtained by transmitting random 15 bytes and a last byte 0x80 plaintext in the financial IC card protocol to extract a waveform P1 obtained by transmitting a random 16-byte plain text; A P3 waveform acquisition unit for extracting a P3 waveform that is a waveform of a difference between a P1 waveform of the P1 waveform acquisition unit and a P2 waveform of the P2 waveform acquisition unit; And a SEED waveform extracting unit for extracting a waveform of the section.
According to another aspect of the present invention, there is provided a method for classifying a block encryption algorithm SEED computation in a financial IC card according to the present invention, in order to perform subchannel safety verification for a financial IC card, A random 16-byte plain text is transmitted to obtain the obtained waveform P1 and the difference between the waveform P1 and the waveform P2 obtained by transmitting the random 15 bytes and the last byte 0x80 plain text in the financial IC card protocol, And extracts a waveform P3 for distinguishing the encryption algorithm SEED.
According to another aspect of the present invention, there is provided a method for classifying a block encryption algorithm SEED computation in a financial IC card according to the present invention, in order to perform subchannel safety verification for a financial IC card, A SEED discrimination step of judging whether a SEED operation is performed by performing a SEED operation and a block encryption algorithm SEED discrimination step; if it is judged that the block encryption algorithm SEED discrimination is performed in the SEED discrimination step, SEED discrimination processing step of discriminating SEED block cipher algorithm, if it is judged that SEED discrimination is not possible in the SEED discrimination step, if it is judged that SEED discrimination is not possible, a random 15 byte and a last byte 0x80 plaintext are transmitted in the financial IC card protocol, Bid fixed value Value setting step; it characterized in that it comprises a; receiving the plain text and the last byte 0x80 random 15 bytes transmitted over the parts of the plaintext transmission waveform difference for determining whether the waveform calculated by the SEED difference determining step.
According to another aspect of the present invention, there is provided a method for classifying a block encryption algorithm SEED computation in a financial IC card according to the present invention, in order to perform subchannel safety verification for a financial IC card, A P1 waveform acquisition step of extracting a waveform P1 obtained by transmitting a random 16-byte plain text, a P2 waveform acquisition step of extracting a waveform P2 obtained by transmitting a random 15 byte and a last byte 0x80 plain text in a financial IC card protocol A P3 waveform acquisition step of extracting a P3 waveform, which is a waveform of a difference between P2 waveforms obtained in the P1 waveform acquisition step and the P2 waveform acquisition step obtained in the P1 waveform acquisition step, and a P3 waveform acquisition step of extracting the P3 waveform And extracting a waveform of three intervals that coincides with the waveform of the SEED waveform All.
The apparatus and method for classifying the block encryption algorithm SEED computation in the financial IC card according to the present invention have the following effects.
First, the block cipher algorithm SEED can be clearly distinguished when the security of the subchannel analysis is verified.
Second, it is possible to distinguish the waveforms by the number of SEED operations that are induced when the last byte of 16 bytes of plain text is fixed at 0x80 and fixed at terminal by financial IC card standard (CFIP.ST.FINIC-02-2014 document) To enable efficient verification of safety for subchannel analysis.
Third, it is possible to verify the safety of subchannel analysis efficiently by using the change of SEED operation frequency of block cipher algorithm in financial IC card according to transmission format of 16 bytes of plain text in the terminal. It makes it possible to utilize domestic and overseas credit card companies that design countermeasures against financial IC cards.
Fourth, it is possible to clearly distinguish the block cipher algorithm SEED when verifying the safety of the subchannel analysis, so that it can provide a more reliable verification procedure for the verification of the security of the domestic financial IC card, and the countermeasure technique can be designed by avoiding it.
1 is a block diagram showing a domestic financial IC card protocol
2 is a block diagram of an apparatus for distinguishing a block encryption algorithm SEED calculation in a financial IC card according to the present invention
Fig. 3 is a detailed configuration diagram of the apparatus for discriminating SEED operation
4 is a flowchart illustrating a method for distinguishing a block encryption algorithm SEED operation in a financial IC card according to the present invention.
5 is a flow chart showing a detailed procedure of a method for discriminating SEED operations
FIGS. 6A and 6B are graphs showing waveform graphs at three times of block encryption algorithm SEED and four times of operation
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Hereinafter, preferred embodiments of an apparatus and method for distinguishing a block encryption algorithm SEED operation in a financial IC card according to the present invention will be described in detail.
The features and advantages of the apparatus and method for block encryption algorithm SEED computation in a financial IC card according to the present invention will be apparent from the detailed description of each embodiment below.
FIG. 2 is a block diagram of an apparatus for distinguishing a block encryption algorithm in a financial IC card according to the present invention, and FIG. 3 is a detailed block diagram of an apparatus for distinguishing an SEED operation.
The present invention distinguishes waveforms by the number of SEED operations induced when the last byte of 16 bytes of plain text is fixed at 0x80 and fixed at terminal by financial IC card standard (CFIP.ST.FINIC-02-2014 document) This method enables efficient configuration of safety verification for subchannel analysis.
In reality, there are a myriad of the same patterns in the waveforms within the financial IC protocol.
In other words, finding the first SEED within the domestic financial IC card protocol waveform is not easy even for a skilled sub-channel analyst.
To solve this problem, the present invention utilizes a protocol that performs SEED three times in the domestic financial IC card protocol and a protocol that executes SEED four times.
In general, three times are driven, but if the last byte of the plaintext is 0x80, four times are driven.
The present invention makes it possible to effectively distinguish the block encryption algorithm SEED, which is a cornerstone in the safety verification for the subchannel analysis, by using this.
In order to perform subchannel safety verification for a financial IC card, a device for classifying a block encryption algorithm SEED calculation in the financial IC card according to the present invention transmits a random 16-byte plain text in the financial IC card protocol A waveform P3 for distinguishing the block encryption algorithm SEED is extracted by using the difference between the obtained waveform P1 and the waveform P2 obtained by transmitting the random 15 bytes and the last byte 0x80 plain text in the financial IC card protocol .
Here, when a random 16-byte plain text other than 0x80 is transmitted in the financial IC card protocol, SEED is performed three times in the financial IC card protocol. When random 15 bytes and the last byte 0x80 plain text are transmitted, It is included as a feature to perform SEED four times within the card protocol.
In order to distinguish the block cipher algorithm SEED, a waveform of three intervals corresponding to the waveform P3 within the waveform P1 is extracted.
As shown in FIG. 2, in order to perform subchannel safety verification for a domestic financial IC card, a device for classifying a block encryption algorithm SEED computation in the financial IC card according to the present invention uses a last byte A SEED
If it is determined in the waveform
The detailed configuration of the SEED
A P1
Operation control of the apparatus for distinguishing the block encryption algorithm SEED operation in the financial IC card according to the present invention having the above-described structure will be described as follows.
FIG. 4 is a flowchart illustrating a method for distinguishing a block encryption algorithm SEED operation in a financial IC card according to the present invention, and FIG. 5 is a flowchart illustrating a detailed process of a method for distinguishing an SEED operation.
6A and 6B are waveform graphs of three times of block encryption algorithm SEED and four times of operation.
In order to perform the subchannel safety verification on the financial IC card, a method for distinguishing the block encryption algorithm SEED calculation in the financial IC card according to the present invention,
Obtained by transmitting a random 16-byte plain text in the financial IC card protocol, the last byte not being 0x80, and transmitting the random P1 15 and the last 15 bytes 0x80 plain text in the financial IC card protocol. And extracting a waveform P3 for distinguishing the block encryption algorithm SEED using the difference of the waveform P2.
FIG. 4 shows a method for efficiently distinguishing a block encryption algorithm SEED operation when a financial IC card is driven.
According to the financial IC card standard (CFIP.ST.FINIC-02-2014 document) issued by the Financial Informatization Promotion Council, the number of SEED operations that are induced when the last byte of the 16 bytes of plain text is fixed at 0x80 and when it is not fixed. The waveforms are divided into two groups.
First, in order to perform subchannel safety verification for the domestic financial IC card, a random 16-byte plain text other than 0x80 is transmitted within the financial IC card protocol (S401)
Then, a SEED operation is performed by performing a protocol, and a SEED classification determination step is performed to determine whether a block encryption algorithm SEED is distinguished (S402)
If it is determined that the block encryption algorithm SEED is discriminated in the SEED discrimination step, the waveform is collected to classify the block encryption algorithm SEED (S405). If it is determined that the block encryption algorithm SEED is not classified in the SEED classification determination step, The last byte value is fixed and transmitted so that random 15 bytes and the last byte 0x80 plain text are transmitted in the protocol (S403)
Then, a waveform difference determination step is performed to determine whether there is a waveform difference by performing a SEED operation on the transmitted random 15 bytes and the last byte 0x80 plain text (S404)
If it is determined in the waveform difference determination step that there is a difference between the waveform for the random 16-byte plain text and the waveform for the random byte 15 and the last byte 0x80 plain text other than 0x80, the SEED
The block encryption algorithm SEED classification process will be described in more detail as follows.
As shown in FIG. 5, a P1 waveform acquisition step of extracting a waveform P1 obtained by transmitting a random 16-byte plain text in which the last byte of the account number is not 0x80 is performed in the financial IC card protocol, And a last byte 0x80 plain text are transmitted to perform a P2 waveform acquisition step of extracting the obtained waveform P2 (S501)
And a P3 waveform acquisition step of extracting a P3 waveform, which is a waveform of the difference between the P2 waveforms obtained in the P1 waveform acquisition step and the P2 waveform acquisition step, performed in the P1 waveform acquisition step (S502)
Next, in order to distinguish the block encryption algorithm SEED, a SEED waveform extraction step of extracting waveforms of three intervals corresponding to the P3 waveform within the P1 waveform is performed (S503)
Thus, when the protocol is executed by inputting 0x80 in the last byte of the account password, SEED is executed four times.
It is not necessary to search for the same pattern, and the waveform that is increased more than the
That is, the remaining three SEED waveforms having a pattern similar to the increased waveform can be extracted.
FIG. 6A shows that SEED operates three times when it is generally accessed within the financial IC card protocol.
After assuming that SEED operates three times, it is not easy to find exactly three points when looking at the waveform. This is because there are a large number of other parts repeatedly indicating three places in the waveform.
However, as shown in FIG. 6B according to the present invention, if the last byte of the plaintext is specified as 0x80 in the financial IC card protocol, the increased portion on the waveform is SEED.
Based on this, it is possible to more easily find a total of three repeating patterns in the front part having the same pattern.
As a result, it is possible to efficiently distinguish the block cipher algorithm SEED, which is one of the most important steps, in the verification of the security for the subchannel analysis.
The apparatus and method for distinguishing the block encryption algorithm SEED computation in the financial IC card according to the present invention efficiently distinguish the block decryption algorithm SEED of the first start step when performing the subchannel safety verification for the domestic financial IC card .
As one of the most important steps in the safety verification, it is possible to provide a more stable verification procedure for the verification of the safety of the domestic financial IC card and, conversely, a countermeasure technique can be designed by avoiding it. It is also applicable to protocols similar to domestic financial IC cards.
As described above, it will be understood that the present invention is implemented in a modified form without departing from the essential characteristics of the present invention.
It is therefore to be understood that the specified embodiments are to be considered in an illustrative rather than a restrictive sense and that the scope of the invention is indicated by the appended claims rather than by the foregoing description and that all such differences falling within the scope of equivalents thereof are intended to be embraced therein It should be interpreted.
10. Plain
SEED
50. A waveform difference judging unit
Claims (11)
A plain text transmission unit for transmitting a random 16-byte plain text in which the last byte is not 0x80 in the financial IC card protocol;
Protocol to perform a SEED operation and determine whether a block encryption algorithm is SEED classification;
A SEED classification processing unit for collecting a waveform and discriminating a block encryption algorithm SEED if the SEED classification determination unit determines that the block encryption algorithm is SEED classification;
A byte value fixing unit for fixing the last byte value so that random 15 bytes and a last byte 0x80 plain text are transmitted in the financial IC card protocol when the SEED classification determination unit determines that the block encryption algorithm SEED is not classified;
And a waveform difference determining unit for determining whether there is a waveform difference by performing a SEED operation on the random 15 bytes transmitted through the plain text transmitting unit and the last byte 0x80 plain text. Lt; / RTI >
SEED division processing unit performs block encryption algorithm SEED classification in the financial IC card.
The SEED is performed four times within the financial IC card protocol when the random 15 bytes and the last byte 0x80 plain text are transmitted.
A P1 waveform acquisition unit for extracting a waveform P1 obtained by transmitting a random 16-byte plain text in the financial IC card protocol, the last byte of which is not 0x80;
A P2 waveform acquisition unit for extracting a waveform (P2) obtained by transmitting random 15 bytes and a last byte 0x80 plaintext in the financial IC card protocol;
A P3 waveform acquisition unit for extracting a P3 waveform that is a waveform of a difference between a P1 waveform of the P1 waveform acquisition unit and a P2 waveform of the P2 waveform acquisition unit;
And a SEED waveform extraction unit for extracting waveforms of three intervals corresponding to the P3 waveform within the P1 waveform in order to distinguish the block encryption algorithm SEED from the SEED waveform extraction unit. .
Obtains the obtained waveform P1 by transmitting a random 16-byte plain text in which the last byte is not 0x80 in the financial IC card protocol,
Using the difference between the waveform P1 and the waveform P2 obtained by transmitting the random 15 bytes and the last byte 0x80 plain text in the financial IC card protocol,
And a waveform (P3) for distinguishing the block encryption algorithm SEED is extracted.
The SEED is performed four times within the financial IC card protocol when the random 15 bytes and the last byte 0x80 plain text are transmitted.
A plaintext transmission step of transmitting a random 16-byte plain text in which the last byte is not 0x80 in the financial IC card protocol;
A SEED discrimination step of performing a SEED operation by performing a protocol and judging whether a block encryption algorithm SEED discrimination is performed;
A SEED classification processing step of collecting a waveform and discriminating a block cipher algorithm SEED if it is determined that the block cipher algorithm SEED is classified in the SEED classification determination step;
A byte value fixing step of fixing a last byte value so that random 15 bytes and a last byte 0x80 plain text are transmitted in the financial IC card protocol if it is determined that the block encryption algorithm SEED can not be discriminated in the SEED discrimination step;
And a waveform difference judging step of judging whether there is a waveform difference by performing a SEED operation on the random 15 bytes transmitted through the plain text transmitter and the last byte 0x80 plain text. Way.
A block encryption algorithm in the financial IC card, characterized by separating the block encryption algorithm SEED in the SEED division processing step.
The SEED is performed four times within the financial IC card protocol when the random 15 bytes and the last byte 0x80 plain text are transmitted.
A P1 waveform acquisition step of extracting a waveform P1 obtained by transmitting a random 16-byte plain text in which the last byte of the account number is not 0x80 in the financial IC card protocol;
A P2 waveform acquisition step of extracting a waveform (P2) obtained by transmitting random 15 bytes and a last byte 0x80 plaintext in the financial IC card protocol;
A P3 waveform acquisition step of extracting a P3 waveform, which is a waveform of a difference between P2 waveforms obtained in the P1 waveform acquisition step and the P2 waveform acquisition step obtained in the P1 waveform acquisition step;
And a SEED waveform extracting step of extracting waveforms of three intervals that coincide with the P3 waveform within the P1 waveform to distinguish the block encryption algorithm SEED. Way.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020170098194A KR101852546B1 (en) | 2017-08-02 | 2017-08-02 | System and Method for Distinguishing Block Cipher SEED when Operating Financial IC Card |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020170098194A KR101852546B1 (en) | 2017-08-02 | 2017-08-02 | System and Method for Distinguishing Block Cipher SEED when Operating Financial IC Card |
Publications (1)
Publication Number | Publication Date |
---|---|
KR101852546B1 true KR101852546B1 (en) | 2018-06-11 |
Family
ID=62600725
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020170098194A KR101852546B1 (en) | 2017-08-02 | 2017-08-02 | System and Method for Distinguishing Block Cipher SEED when Operating Financial IC Card |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR101852546B1 (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090010424A1 (en) * | 2007-07-05 | 2009-01-08 | Broadcom Corporation | System and Methods for Side-Channel Attack Prevention |
EP2148462A1 (en) * | 2008-07-22 | 2010-01-27 | University College Cork | A differential side-channel analysis countermeasure |
KR20110020153A (en) * | 2009-08-21 | 2011-03-02 | 한국전자통신연구원 | Method and apparatus for processing f-function in seed encryption system |
KR20110071931A (en) | 2009-12-22 | 2011-06-29 | 한국전자통신연구원 | Method of genarating wave information file structure for side-channel analysis system |
KR20130067359A (en) | 2011-12-14 | 2013-06-24 | 한국전자통신연구원 | Method and apparatus for providing data arrangement for side channel analysis |
KR20160015776A (en) | 2014-07-31 | 2016-02-15 | 국민대학교산학협력단 | Appropriate Countermeasure against Side Channel Analysis on Cryptogram Generating Process of Financial IC Cards |
-
2017
- 2017-08-02 KR KR1020170098194A patent/KR101852546B1/en active IP Right Grant
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090010424A1 (en) * | 2007-07-05 | 2009-01-08 | Broadcom Corporation | System and Methods for Side-Channel Attack Prevention |
EP2148462A1 (en) * | 2008-07-22 | 2010-01-27 | University College Cork | A differential side-channel analysis countermeasure |
KR20110020153A (en) * | 2009-08-21 | 2011-03-02 | 한국전자통신연구원 | Method and apparatus for processing f-function in seed encryption system |
KR20110071931A (en) | 2009-12-22 | 2011-06-29 | 한국전자통신연구원 | Method of genarating wave information file structure for side-channel analysis system |
KR20130067359A (en) | 2011-12-14 | 2013-06-24 | 한국전자통신연구원 | Method and apparatus for providing data arrangement for side channel analysis |
KR20160015776A (en) | 2014-07-31 | 2016-02-15 | 국민대학교산학협력단 | Appropriate Countermeasure against Side Channel Analysis on Cryptogram Generating Process of Financial IC Cards |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Oswald et al. | Breaking Mifare DESFire MF3ICD40: Power analysis and templates in the real world | |
RU2018105186A (en) | VERIFICATION OF PORTABLE CONSUMER DEVICES | |
US9497021B2 (en) | Device for generating a message authentication code for authenticating a message | |
CN109417481A (en) | Safety is improved by the temporary key of the virtual non-contact card of software in mobile phone | |
KR101623493B1 (en) | Appropriate Countermeasure against Side Channel Analysis on Cryptogram Generating Process of Financial IC Cards | |
CN111327561B (en) | Authentication method, system, authentication server, and computer-readable storage medium | |
CN106156615B (en) | Based on class separability sentence away from bypass circuit sectionalizer method and system | |
US7289959B2 (en) | Biometric identification method, portable electronic device and electronic device acquiring biometric data therefor | |
KR101852546B1 (en) | System and Method for Distinguishing Block Cipher SEED when Operating Financial IC Card | |
Zhang et al. | A highly effective DPA attack method based on genetic algorithm | |
CN108471419B (en) | Certificate sharing method based on trusted identity | |
CN113204775B (en) | Data security protection method and system | |
KR101981621B1 (en) | System and Method for Key bit Parameter Randomizating of public key cryptography | |
CN105897401A (en) | Bit-based universal differential power consumption analysis method and system | |
Ru et al. | Audio steganalysis based on “negative resonance phenomenon” caused by steganographic tools | |
Feix et al. | Defeating iso9797-1 mac algo 3 by combining side-channel and brute force techniques | |
CN107493572B (en) | Wireless radio frequency equipment, authentication server and authentication method | |
CN111371727A (en) | Detection method for NTP protocol covert communication | |
Delivasilis et al. | Side Channel Analysis on Biometric-based Key Generation Algorithms on Resource Constrained Devices. | |
CN112134685B (en) | DPA attack-preventing circuit to be tested safety simulation analysis method and device | |
CN114218561A (en) | Weak password detection method, terminal equipment and storage medium | |
CN110826076B (en) | Data processing method, device, equipment and system | |
KR20190105894A (en) | Method and storage medium for clustering of templates in the side channel template analysis | |
Zhang et al. | Mahalanobis distance similarity measure based distinguisher for template attack | |
CN115580489B (en) | Data transmission method, device, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
E701 | Decision to grant or registration of patent right | ||
GRNT | Written decision to grant |