KR101852546B1 - System and Method for Distinguishing Block Cipher SEED when Operating Financial IC Card - Google Patents

System and Method for Distinguishing Block Cipher SEED when Operating Financial IC Card Download PDF

Info

Publication number
KR101852546B1
KR101852546B1 KR1020170098194A KR20170098194A KR101852546B1 KR 101852546 B1 KR101852546 B1 KR 101852546B1 KR 1020170098194 A KR1020170098194 A KR 1020170098194A KR 20170098194 A KR20170098194 A KR 20170098194A KR 101852546 B1 KR101852546 B1 KR 101852546B1
Authority
KR
South Korea
Prior art keywords
waveform
seed
financial
random
plain text
Prior art date
Application number
KR1020170098194A
Other languages
Korean (ko)
Inventor
원유승
박애선
심보연
조영진
이종혁
한동국
Original Assignee
국민대학교산학협력단
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 국민대학교산학협력단 filed Critical 국민대학교산학협력단
Priority to KR1020170098194A priority Critical patent/KR101852546B1/en
Application granted granted Critical
Publication of KR101852546B1 publication Critical patent/KR101852546B1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • H04L9/003Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Abstract

The present invention relates to a device for classifying SEED computation of a block encryption algorithm in a financial IC card, which enables the block cipher algorithm SEED to be clearly distinguished in safety verification of subchannel analysis by specifying the last byte of the plain text in the financial IC card protocol as 0x80 Method for performing subchannel safety verification on a financial IC card, a waveform (P1) obtained by transmitting a random 16-byte plain text in which the last byte is not 0x80 in the financial IC card protocol, and a random (P3) for distinguishing the block encryption algorithm SEED by using the difference between the waveform (P2) obtained by transmitting the 15 bytes and the last byte 0x80 plain text.

Description

FIELD OF THE INVENTION [0001] The present invention relates to an apparatus and a method for distinguishing a block encryption algorithm in a financial IC card,

The present invention relates to an efficient safety verification technique for subchannel analysis and more specifically to a block encryption algorithm SEED computation in a financial IC card to clearly distinguish a block cipher algorithm SEED at the time of verifying safety against a sub- And more particularly,

Side Channel Analysis (SCA) is an analysis technique first proposed by Paul Kocher in 1996. It is an analytical technique in which a cryptographic device finds a key using physical information exposed by a cryptographic algorithm.

Financial IC card ciphertext data generation procedure is reported to be vulnerable to such subchannel analysis, and it is possible to replicate financial IC card when searching master key.

Therefore, research on the process of generating the financial IC card ciphertext data secure in the subchannel analysis has been actively conducted.

The financial IC card provides security and reliability of the system by performing SEED of 128 bits symmetric key block encryption algorithm three times.

That is, a session key is generated by performing two SEEDs with a master key, a card random number, and a terminal random number as inputs. The plaintext is encrypted using the generated session key and output.

In such a technology, it is necessary to efficiently distinguish a block cipher algorithm SEED operation when a block cipher algorithm SEED operation is performed in a domestic financial IC card.

In accordance with the financial IC card standard (CFIP.ST.FINIC-02-2014 document) issued by the Financial Information Promotion Council, all domestic financial IC cards shall comply with them.

The domestic financial IC card protocol is implemented as shown in FIG. 1 by the financial IC card standard (CFIP.ST.FINIC-02-2014 document) issued by the Financial Information Promotion Council.

1 is a block diagram showing a domestic financial IC card protocol.

Based on this, subchannel safety verification for domestic financial IC card is performed.

In a typical case, a virtual ATM and a user are configured and an arbitrary terminal random number and an arbitrary account password are transmitted to the card.

Since the key to perform the subchannel verification is the first SEED receiving the card random number, the terminal random number and the account password inserted as the inputs of the second and third SEEDs are transmitted or fixed with arbitrary random number 16 bytes.

In general, the waveforms of the second and third SEEDs are not directly used in the subchannel safety verification, but the SEED 3 times in the domestic financial IC card protocol can be easily recognized by the standards.

In other words, as a simple power analysis (SPA) which is one of the important steps in the subchannel analysis, three patterns of the same pattern are found and a waveform is collected for the first SEED.

Thus, the second and third SEEDs do not directly affect the waveform acquisition, but they play an important role in distinguishing the first SEED.

However, in reality, there are a lot of three patterns in the waveforms within the financial IC protocol.

In other words, finding the first SEED within the domestic financial IC card protocol waveform is not easy even for a skilled sub-channel analyst.

Therefore, it is required to develop a new technology that can clearly distinguish the block cipher algorithm SEED when verifying the safety for subchannel analysis.

Korean Patent Publication No. 10-2016-0015776 Korean Patent Publication No. 10-2011-0071931 Korean Patent Publication No. 10-2013-0067359

The present invention solves the problem of safety verification for the subchannel analysis of the domestic financial IC card protocol of the related art. The present invention provides a financial IC The present invention provides a device and method for distinguishing a block encryption algorithm in a card by a SEED algorithm.

The present invention distinguishes waveforms by the number of SEED operations induced when the last byte of 16 bytes of plain text is fixed at 0x80 and fixed at terminal by financial IC card standard (CFIP.ST.FINIC-02-2014 document) The present invention provides a device and method for distinguishing a block encryption algorithm SEED calculation in a financial IC card so as to increase safety for subchannel analysis.

The present invention relates to a device for classifying SEED computation of a block encryption algorithm in a financial IC card, which enables the block cipher algorithm SEED to be clearly distinguished in safety verification of subchannel analysis by specifying the last byte of the plain text in the financial IC card protocol as 0x80 The purpose of the method is to provide.

The present invention utilizes a change in the number of block encryption algorithm SEED operations in a financial IC card according to the 16-byte transmission format of a plain text in a terminal, thereby enhancing the safety of the sub-channel analysis. The present invention provides a device and method for distinguishing a block encryption algorithm SEED calculation in a financial IC card that can be utilized by domestic and overseas card companies that design a countermeasure against a financial IC card.

The objects of the present invention are not limited to the above-mentioned objects, and other objects not mentioned can be clearly understood by those skilled in the art from the following description.

In order to achieve sub-channel safety verification for a financial IC card, an apparatus for classifying a block encryption algorithm SEED calculation in a financial IC card according to the present invention for achieving the above object is a system in which a last byte in a financial IC card protocol is not 0x80 A plain text transmission unit for transmitting a random 16-byte plain text, a SEED classification determination unit for performing a SEED computation by performing a protocol and determining whether a block encryption algorithm is SEED classification, A SEED discriminating unit for discriminating a block cipher algorithm SEED if the SEED discrimination judging unit determines that the block cipher algorithm SEED can not be classified; A byte value fixing unit for fixing the byte value; And a waveform difference determiner for determining whether there is a waveform difference by performing a SEED operation on the random 15 bytes transmitted through the plain text transmitter and the last byte 0x80 plain text.

In order to perform subchannel safety verification for a financial IC card, a device for discriminating a block encryption algorithm in a financial IC card according to the present invention for achieving another object, A P2 waveform acquiring unit for extracting a waveform P2 obtained by transmitting random 15 bytes and a last byte 0x80 plaintext in the financial IC card protocol to extract a waveform P1 obtained by transmitting a random 16-byte plain text; A P3 waveform acquisition unit for extracting a P3 waveform that is a waveform of a difference between a P1 waveform of the P1 waveform acquisition unit and a P2 waveform of the P2 waveform acquisition unit; And a SEED waveform extracting unit for extracting a waveform of the section.

According to another aspect of the present invention, there is provided a method for classifying a block encryption algorithm SEED computation in a financial IC card according to the present invention, in order to perform subchannel safety verification for a financial IC card, A random 16-byte plain text is transmitted to obtain the obtained waveform P1 and the difference between the waveform P1 and the waveform P2 obtained by transmitting the random 15 bytes and the last byte 0x80 plain text in the financial IC card protocol, And extracts a waveform P3 for distinguishing the encryption algorithm SEED.

According to another aspect of the present invention, there is provided a method for classifying a block encryption algorithm SEED computation in a financial IC card according to the present invention, in order to perform subchannel safety verification for a financial IC card, A SEED discrimination step of judging whether a SEED operation is performed by performing a SEED operation and a block encryption algorithm SEED discrimination step; if it is judged that the block encryption algorithm SEED discrimination is performed in the SEED discrimination step, SEED discrimination processing step of discriminating SEED block cipher algorithm, if it is judged that SEED discrimination is not possible in the SEED discrimination step, if it is judged that SEED discrimination is not possible, a random 15 byte and a last byte 0x80 plaintext are transmitted in the financial IC card protocol, Bid fixed value Value setting step; it characterized in that it comprises a; receiving the plain text and the last byte 0x80 random 15 bytes transmitted over the parts of the plaintext transmission waveform difference for determining whether the waveform calculated by the SEED difference determining step.

According to another aspect of the present invention, there is provided a method for classifying a block encryption algorithm SEED computation in a financial IC card according to the present invention, in order to perform subchannel safety verification for a financial IC card, A P1 waveform acquisition step of extracting a waveform P1 obtained by transmitting a random 16-byte plain text, a P2 waveform acquisition step of extracting a waveform P2 obtained by transmitting a random 15 byte and a last byte 0x80 plain text in a financial IC card protocol A P3 waveform acquisition step of extracting a P3 waveform, which is a waveform of a difference between P2 waveforms obtained in the P1 waveform acquisition step and the P2 waveform acquisition step obtained in the P1 waveform acquisition step, and a P3 waveform acquisition step of extracting the P3 waveform And extracting a waveform of three intervals that coincides with the waveform of the SEED waveform All.

The apparatus and method for classifying the block encryption algorithm SEED computation in the financial IC card according to the present invention have the following effects.

First, the block cipher algorithm SEED can be clearly distinguished when the security of the subchannel analysis is verified.

Second, it is possible to distinguish the waveforms by the number of SEED operations that are induced when the last byte of 16 bytes of plain text is fixed at 0x80 and fixed at terminal by financial IC card standard (CFIP.ST.FINIC-02-2014 document) To enable efficient verification of safety for subchannel analysis.

Third, it is possible to verify the safety of subchannel analysis efficiently by using the change of SEED operation frequency of block cipher algorithm in financial IC card according to transmission format of 16 bytes of plain text in the terminal. It makes it possible to utilize domestic and overseas credit card companies that design countermeasures against financial IC cards.

Fourth, it is possible to clearly distinguish the block cipher algorithm SEED when verifying the safety of the subchannel analysis, so that it can provide a more reliable verification procedure for the verification of the security of the domestic financial IC card, and the countermeasure technique can be designed by avoiding it.

1 is a block diagram showing a domestic financial IC card protocol
2 is a block diagram of an apparatus for distinguishing a block encryption algorithm SEED calculation in a financial IC card according to the present invention
Fig. 3 is a detailed configuration diagram of the apparatus for discriminating SEED operation
4 is a flowchart illustrating a method for distinguishing a block encryption algorithm SEED operation in a financial IC card according to the present invention.
5 is a flow chart showing a detailed procedure of a method for discriminating SEED operations
FIGS. 6A and 6B are graphs showing waveform graphs at three times of block encryption algorithm SEED and four times of operation

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Hereinafter, preferred embodiments of an apparatus and method for distinguishing a block encryption algorithm SEED operation in a financial IC card according to the present invention will be described in detail.

The features and advantages of the apparatus and method for block encryption algorithm SEED computation in a financial IC card according to the present invention will be apparent from the detailed description of each embodiment below.

FIG. 2 is a block diagram of an apparatus for distinguishing a block encryption algorithm in a financial IC card according to the present invention, and FIG. 3 is a detailed block diagram of an apparatus for distinguishing an SEED operation.

The present invention distinguishes waveforms by the number of SEED operations induced when the last byte of 16 bytes of plain text is fixed at 0x80 and fixed at terminal by financial IC card standard (CFIP.ST.FINIC-02-2014 document) This method enables efficient configuration of safety verification for subchannel analysis.

In reality, there are a myriad of the same patterns in the waveforms within the financial IC protocol.

In other words, finding the first SEED within the domestic financial IC card protocol waveform is not easy even for a skilled sub-channel analyst.

To solve this problem, the present invention utilizes a protocol that performs SEED three times in the domestic financial IC card protocol and a protocol that executes SEED four times.

In general, three times are driven, but if the last byte of the plaintext is 0x80, four times are driven.

The present invention makes it possible to effectively distinguish the block encryption algorithm SEED, which is a cornerstone in the safety verification for the subchannel analysis, by using this.

In order to perform subchannel safety verification for a financial IC card, a device for classifying a block encryption algorithm SEED calculation in the financial IC card according to the present invention transmits a random 16-byte plain text in the financial IC card protocol A waveform P3 for distinguishing the block encryption algorithm SEED is extracted by using the difference between the obtained waveform P1 and the waveform P2 obtained by transmitting the random 15 bytes and the last byte 0x80 plain text in the financial IC card protocol .

Here, when a random 16-byte plain text other than 0x80 is transmitted in the financial IC card protocol, SEED is performed three times in the financial IC card protocol. When random 15 bytes and the last byte 0x80 plain text are transmitted, It is included as a feature to perform SEED four times within the card protocol.

In order to distinguish the block cipher algorithm SEED, a waveform of three intervals corresponding to the waveform P3 within the waveform P1 is extracted.

As shown in FIG. 2, in order to perform subchannel safety verification for a domestic financial IC card, a device for classifying a block encryption algorithm SEED computation in the financial IC card according to the present invention uses a last byte A SEED classification determination unit 20 for determining whether a SEED operation is performed by performing a protocol and a block encryption algorithm SEED classification, a SEED classification determination unit 20 The SEED classification processing unit 30 for collecting the waveform and separating the block cipher algorithm SEED, and the SEED classification determination unit 20 for determining that the block cipher algorithm SEED is not distinguished The last byte value is sent so that the random 15 bytes and the last byte 0x80 plain text are transmitted within the financial IC card protocol. And a waveform difference determination unit 50 for determining whether there is a waveform difference by performing a SEED operation on the random byte 15 and the last byte 0x80 plain text transmitted through the plain text transmission unit 10 do.

If it is determined in the waveform difference determination unit 50 that there is a difference between the waveform for the random 16-byte plain text and the waveform for the random 15 bytes and the last byte 0x80 plain text in which the last byte is not 0x80, the SEED classification processing unit 30 Separate the encryption algorithm SEED.

The detailed configuration of the SEED classification processing unit 30 is shown in FIG.

A P1 waveform acquisition unit 31 for extracting a waveform P1 obtained by transmitting a random 16-byte plain text in which the last byte of the account number is not 0x80 in the financial IC card protocol, and a P1 waveform acquisition unit 31 for generating random 15 bytes and last byte 0x80 plaintext And a P3 waveform which is a waveform of the difference between the P2 waveform of the P1 waveform of the P1 waveform obtaining unit 31 and the P2 waveform of the P2 waveform obtaining unit 32. The P2 waveform obtaining unit 32 extracts the P3 waveform, And a SEED waveform extracting unit 34 for extracting waveforms of three intervals corresponding to the P3 waveform in the P1 waveform to distinguish the block encryption algorithm SEED from the P3 waveform acquisition unit 33. [

Operation control of the apparatus for distinguishing the block encryption algorithm SEED operation in the financial IC card according to the present invention having the above-described structure will be described as follows.

FIG. 4 is a flowchart illustrating a method for distinguishing a block encryption algorithm SEED operation in a financial IC card according to the present invention, and FIG. 5 is a flowchart illustrating a detailed process of a method for distinguishing an SEED operation.

6A and 6B are waveform graphs of three times of block encryption algorithm SEED and four times of operation.

In order to perform the subchannel safety verification on the financial IC card, a method for distinguishing the block encryption algorithm SEED calculation in the financial IC card according to the present invention,

Obtained by transmitting a random 16-byte plain text in the financial IC card protocol, the last byte not being 0x80, and transmitting the random P1 15 and the last 15 bytes 0x80 plain text in the financial IC card protocol. And extracting a waveform P3 for distinguishing the block encryption algorithm SEED using the difference of the waveform P2.

FIG. 4 shows a method for efficiently distinguishing a block encryption algorithm SEED operation when a financial IC card is driven.

According to the financial IC card standard (CFIP.ST.FINIC-02-2014 document) issued by the Financial Informatization Promotion Council, the number of SEED operations that are induced when the last byte of the 16 bytes of plain text is fixed at 0x80 and when it is not fixed. The waveforms are divided into two groups.

First, in order to perform subchannel safety verification for the domestic financial IC card, a random 16-byte plain text other than 0x80 is transmitted within the financial IC card protocol (S401)

Then, a SEED operation is performed by performing a protocol, and a SEED classification determination step is performed to determine whether a block encryption algorithm SEED is distinguished (S402)

If it is determined that the block encryption algorithm SEED is discriminated in the SEED discrimination step, the waveform is collected to classify the block encryption algorithm SEED (S405). If it is determined that the block encryption algorithm SEED is not classified in the SEED classification determination step, The last byte value is fixed and transmitted so that random 15 bytes and the last byte 0x80 plain text are transmitted in the protocol (S403)

Then, a waveform difference determination step is performed to determine whether there is a waveform difference by performing a SEED operation on the transmitted random 15 bytes and the last byte 0x80 plain text (S404)

If it is determined in the waveform difference determination step that there is a difference between the waveform for the random 16-byte plain text and the waveform for the random byte 15 and the last byte 0x80 plain text other than 0x80, the SEED classification processing unit 30 determines the block encryption algorithm SEED classification (S405)

The block encryption algorithm SEED classification process will be described in more detail as follows.

As shown in FIG. 5, a P1 waveform acquisition step of extracting a waveform P1 obtained by transmitting a random 16-byte plain text in which the last byte of the account number is not 0x80 is performed in the financial IC card protocol, And a last byte 0x80 plain text are transmitted to perform a P2 waveform acquisition step of extracting the obtained waveform P2 (S501)

And a P3 waveform acquisition step of extracting a P3 waveform, which is a waveform of the difference between the P2 waveforms obtained in the P1 waveform acquisition step and the P2 waveform acquisition step, performed in the P1 waveform acquisition step (S502)

Next, in order to distinguish the block encryption algorithm SEED, a SEED waveform extraction step of extracting waveforms of three intervals corresponding to the P3 waveform within the P1 waveform is performed (S503)

Thus, when the protocol is executed by inputting 0x80 in the last byte of the account password, SEED is executed four times.

It is not necessary to search for the same pattern, and the waveform that is increased more than the SEED 3 times is the fourth SEED waveform.

That is, the remaining three SEED waveforms having a pattern similar to the increased waveform can be extracted.

FIG. 6A shows that SEED operates three times when it is generally accessed within the financial IC card protocol.

After assuming that SEED operates three times, it is not easy to find exactly three points when looking at the waveform. This is because there are a large number of other parts repeatedly indicating three places in the waveform.

However, as shown in FIG. 6B according to the present invention, if the last byte of the plaintext is specified as 0x80 in the financial IC card protocol, the increased portion on the waveform is SEED.

Based on this, it is possible to more easily find a total of three repeating patterns in the front part having the same pattern.

As a result, it is possible to efficiently distinguish the block cipher algorithm SEED, which is one of the most important steps, in the verification of the security for the subchannel analysis.

The apparatus and method for distinguishing the block encryption algorithm SEED computation in the financial IC card according to the present invention efficiently distinguish the block decryption algorithm SEED of the first start step when performing the subchannel safety verification for the domestic financial IC card .

As one of the most important steps in the safety verification, it is possible to provide a more stable verification procedure for the verification of the safety of the domestic financial IC card and, conversely, a countermeasure technique can be designed by avoiding it. It is also applicable to protocols similar to domestic financial IC cards.

As described above, it will be understood that the present invention is implemented in a modified form without departing from the essential characteristics of the present invention.

It is therefore to be understood that the specified embodiments are to be considered in an illustrative rather than a restrictive sense and that the scope of the invention is indicated by the appended claims rather than by the foregoing description and that all such differences falling within the scope of equivalents thereof are intended to be embraced therein It should be interpreted.

10. Plain text transmission part 20. SEED classification judgment part
SEED classification processing unit 40. Byte value fixing unit
50. A waveform difference judging unit

Claims (11)

In order to perform subchannel safety verification for financial IC cards,
A plain text transmission unit for transmitting a random 16-byte plain text in which the last byte is not 0x80 in the financial IC card protocol;
Protocol to perform a SEED operation and determine whether a block encryption algorithm is SEED classification;
A SEED classification processing unit for collecting a waveform and discriminating a block encryption algorithm SEED if the SEED classification determination unit determines that the block encryption algorithm is SEED classification;
A byte value fixing unit for fixing the last byte value so that random 15 bytes and a last byte 0x80 plain text are transmitted in the financial IC card protocol when the SEED classification determination unit determines that the block encryption algorithm SEED is not classified;
And a waveform difference determining unit for determining whether there is a waveform difference by performing a SEED operation on the random 15 bytes transmitted through the plain text transmitting unit and the last byte 0x80 plain text. Lt; / RTI >
The method of claim 1, wherein if the waveform difference determination unit determines that there is a difference between a waveform for a random 16-byte plain text whose last byte is not 0x80 and a waveform for a random 15 byte and a last byte <
SEED division processing unit performs block encryption algorithm SEED classification in the financial IC card.
The method as claimed in claim 1 or 2, wherein when a random 16-byte plain text is transmitted in the financial IC card protocol other than the last byte of 0x80, SEED is performed three times in the financial IC card protocol,
The SEED is performed four times within the financial IC card protocol when the random 15 bytes and the last byte 0x80 plain text are transmitted.
In order to perform subchannel safety verification for financial IC cards,
A P1 waveform acquisition unit for extracting a waveform P1 obtained by transmitting a random 16-byte plain text in the financial IC card protocol, the last byte of which is not 0x80;
A P2 waveform acquisition unit for extracting a waveform (P2) obtained by transmitting random 15 bytes and a last byte 0x80 plaintext in the financial IC card protocol;
A P3 waveform acquisition unit for extracting a P3 waveform that is a waveform of a difference between a P1 waveform of the P1 waveform acquisition unit and a P2 waveform of the P2 waveform acquisition unit;
And a SEED waveform extraction unit for extracting waveforms of three intervals corresponding to the P3 waveform within the P1 waveform in order to distinguish the block encryption algorithm SEED from the SEED waveform extraction unit. .
In order to perform subchannel safety verification for financial IC cards,
Obtains the obtained waveform P1 by transmitting a random 16-byte plain text in which the last byte is not 0x80 in the financial IC card protocol,
Using the difference between the waveform P1 and the waveform P2 obtained by transmitting the random 15 bytes and the last byte 0x80 plain text in the financial IC card protocol,
And a waveform (P3) for distinguishing the block encryption algorithm SEED is extracted.
6. The method as claimed in claim 5, wherein when a random 16-byte plain text is transmitted in the financial IC card protocol other than the last byte is 0x80, SEED is performed three times in the financial IC card protocol,
The SEED is performed four times within the financial IC card protocol when the random 15 bytes and the last byte 0x80 plain text are transmitted.
The method according to claim 5 or 6, wherein waveforms of three intervals corresponding to the waveform (P3) within the waveform (P1) are extracted. In order to perform subchannel safety verification for financial IC cards,
A plaintext transmission step of transmitting a random 16-byte plain text in which the last byte is not 0x80 in the financial IC card protocol;
A SEED discrimination step of performing a SEED operation by performing a protocol and judging whether a block encryption algorithm SEED discrimination is performed;
A SEED classification processing step of collecting a waveform and discriminating a block cipher algorithm SEED if it is determined that the block cipher algorithm SEED is classified in the SEED classification determination step;
A byte value fixing step of fixing a last byte value so that random 15 bytes and a last byte 0x80 plain text are transmitted in the financial IC card protocol if it is determined that the block encryption algorithm SEED can not be discriminated in the SEED discrimination step;
And a waveform difference judging step of judging whether there is a waveform difference by performing a SEED operation on the random 15 bytes transmitted through the plain text transmitter and the last byte 0x80 plain text. Way.
The method of claim 8, wherein if it is determined that there is a difference between a waveform for a random 16-byte plain text whose last byte is not 0x80 and a waveform for a random 15 byte and a last byte 0x80 plain text,
A block encryption algorithm in the financial IC card, characterized by separating the block encryption algorithm SEED in the SEED division processing step.
The method as claimed in claim 8 or 9, wherein when a random 16-byte plain text is transmitted in the financial IC card protocol other than the last byte is 0x80, SEED is performed three times in the financial IC card protocol,
The SEED is performed four times within the financial IC card protocol when the random 15 bytes and the last byte 0x80 plain text are transmitted.
In order to perform subchannel safety verification for financial IC cards,
A P1 waveform acquisition step of extracting a waveform P1 obtained by transmitting a random 16-byte plain text in which the last byte of the account number is not 0x80 in the financial IC card protocol;
A P2 waveform acquisition step of extracting a waveform (P2) obtained by transmitting random 15 bytes and a last byte 0x80 plaintext in the financial IC card protocol;
A P3 waveform acquisition step of extracting a P3 waveform, which is a waveform of a difference between P2 waveforms obtained in the P1 waveform acquisition step and the P2 waveform acquisition step obtained in the P1 waveform acquisition step;
And a SEED waveform extracting step of extracting waveforms of three intervals that coincide with the P3 waveform within the P1 waveform to distinguish the block encryption algorithm SEED. Way.
KR1020170098194A 2017-08-02 2017-08-02 System and Method for Distinguishing Block Cipher SEED when Operating Financial IC Card KR101852546B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020170098194A KR101852546B1 (en) 2017-08-02 2017-08-02 System and Method for Distinguishing Block Cipher SEED when Operating Financial IC Card

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020170098194A KR101852546B1 (en) 2017-08-02 2017-08-02 System and Method for Distinguishing Block Cipher SEED when Operating Financial IC Card

Publications (1)

Publication Number Publication Date
KR101852546B1 true KR101852546B1 (en) 2018-06-11

Family

ID=62600725

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020170098194A KR101852546B1 (en) 2017-08-02 2017-08-02 System and Method for Distinguishing Block Cipher SEED when Operating Financial IC Card

Country Status (1)

Country Link
KR (1) KR101852546B1 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090010424A1 (en) * 2007-07-05 2009-01-08 Broadcom Corporation System and Methods for Side-Channel Attack Prevention
EP2148462A1 (en) * 2008-07-22 2010-01-27 University College Cork A differential side-channel analysis countermeasure
KR20110020153A (en) * 2009-08-21 2011-03-02 한국전자통신연구원 Method and apparatus for processing f-function in seed encryption system
KR20110071931A (en) 2009-12-22 2011-06-29 한국전자통신연구원 Method of genarating wave information file structure for side-channel analysis system
KR20130067359A (en) 2011-12-14 2013-06-24 한국전자통신연구원 Method and apparatus for providing data arrangement for side channel analysis
KR20160015776A (en) 2014-07-31 2016-02-15 국민대학교산학협력단 Appropriate Countermeasure against Side Channel Analysis on Cryptogram Generating Process of Financial IC Cards

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090010424A1 (en) * 2007-07-05 2009-01-08 Broadcom Corporation System and Methods for Side-Channel Attack Prevention
EP2148462A1 (en) * 2008-07-22 2010-01-27 University College Cork A differential side-channel analysis countermeasure
KR20110020153A (en) * 2009-08-21 2011-03-02 한국전자통신연구원 Method and apparatus for processing f-function in seed encryption system
KR20110071931A (en) 2009-12-22 2011-06-29 한국전자통신연구원 Method of genarating wave information file structure for side-channel analysis system
KR20130067359A (en) 2011-12-14 2013-06-24 한국전자통신연구원 Method and apparatus for providing data arrangement for side channel analysis
KR20160015776A (en) 2014-07-31 2016-02-15 국민대학교산학협력단 Appropriate Countermeasure against Side Channel Analysis on Cryptogram Generating Process of Financial IC Cards

Similar Documents

Publication Publication Date Title
Oswald et al. Breaking Mifare DESFire MF3ICD40: Power analysis and templates in the real world
RU2018105186A (en) VERIFICATION OF PORTABLE CONSUMER DEVICES
US9497021B2 (en) Device for generating a message authentication code for authenticating a message
CN109417481A (en) Safety is improved by the temporary key of the virtual non-contact card of software in mobile phone
KR101623493B1 (en) Appropriate Countermeasure against Side Channel Analysis on Cryptogram Generating Process of Financial IC Cards
CN111327561B (en) Authentication method, system, authentication server, and computer-readable storage medium
CN106156615B (en) Based on class separability sentence away from bypass circuit sectionalizer method and system
US7289959B2 (en) Biometric identification method, portable electronic device and electronic device acquiring biometric data therefor
KR101852546B1 (en) System and Method for Distinguishing Block Cipher SEED when Operating Financial IC Card
Zhang et al. A highly effective DPA attack method based on genetic algorithm
CN108471419B (en) Certificate sharing method based on trusted identity
CN113204775B (en) Data security protection method and system
KR101981621B1 (en) System and Method for Key bit Parameter Randomizating of public key cryptography
CN105897401A (en) Bit-based universal differential power consumption analysis method and system
Ru et al. Audio steganalysis based on “negative resonance phenomenon” caused by steganographic tools
Feix et al. Defeating iso9797-1 mac algo 3 by combining side-channel and brute force techniques
CN107493572B (en) Wireless radio frequency equipment, authentication server and authentication method
CN111371727A (en) Detection method for NTP protocol covert communication
Delivasilis et al. Side Channel Analysis on Biometric-based Key Generation Algorithms on Resource Constrained Devices.
CN112134685B (en) DPA attack-preventing circuit to be tested safety simulation analysis method and device
CN114218561A (en) Weak password detection method, terminal equipment and storage medium
CN110826076B (en) Data processing method, device, equipment and system
KR20190105894A (en) Method and storage medium for clustering of templates in the side channel template analysis
Zhang et al. Mahalanobis distance similarity measure based distinguisher for template attack
CN115580489B (en) Data transmission method, device, equipment and storage medium

Legal Events

Date Code Title Description
E701 Decision to grant or registration of patent right
GRNT Written decision to grant