Àüü
ÀüÀÚ/Àü±â
Åë½Å
ÄÄÇ»ÅÍ
·Î±×ÀÎ
ȸ¿ø°¡ÀÔ
About Us
ÀÌ¿ë¾È³»
¿¬±¸¹®Çå
±¹³» ³í¹®Áö
¿µ¹® ³í¹®Áö
±¹³» ÇÐȸÁö
Çмú´ëȸ ÇÁ·Î½Ãµù
±¹³» ÇÐÀ§ ³í¹®
³í¹®Á¤º¸
¹é¼
±³À°Á¤º¸
¿¬±¸ ù°ÉÀ½
ÇаúÁ¤º¸
°ÀÇÁ¤º¸
µ¿¿µ»óÁ¤º¸
E-Learning
¿Â¶óÀÎ Àú³Î
½ÉÈÁ¤º¸
¿¬±¸ ¹× ±â¼úµ¿Çâ
Áֿ俬±¸ÅäÇÈ
ÁÖ¿ä°úÁ¦ ¹× ±â°ü
Çؿܱâ°ü °ü·ÃÀÚ·á
¹ÙÀÌ¿À Á¤º¸±â¼ú
ÁÖ¿ä Archive Site
Æ÷Ä¿½ºiN
¿¬±¸ÀÚ Á¤º¸
¶óÀÌ¡½ºÅ¸
ÆÄ¿öiNÅͺä
¼¼ÁßÇÑ
¿¬±¸ÀÚ·á
¹®ÀÚ DB
¿ë¾î»çÀü
¾Ë¸²¸¶´ç
ºÎ½Ç ÇмúÈ°µ¿ ¿¹¹æ
³í¹®¸ðÁý
´ëȸ¾È³»
What's New
¿¬±¸ºñÁ¤º¸
±¸ÀÎÁ¤º¸
°øÁö»çÇ×
CSERIC ±¤Àå
Post-Conference
¿¬±¸ÀÚ Ä«Æä
ÀÚÀ¯°Ô½ÃÆÇ
Q&A
´Ý±â
»çÀÌÆ®¸Ê
¿¬±¸¹®Çå
±¹³» ³í¹®Áö
¿µ¹® ³í¹®Áö
±¹³» ÇÐȸÁö
Çмú´ëȸ ÇÁ·Î½Ãµù
±¹³» ÇÐÀ§ ³í¹®
³í¹®Á¤º¸
¹é¼
±³À°Á¤º¸
¿¬±¸ ù°ÉÀ½
ÇаúÁ¤º¸
°ÀÇÁ¤º¸
µ¿¿µ»óÁ¤º¸
E-Learning
¿Â¶óÀÎ Àú³Î
½ÉÈÁ¤º¸
¿¬±¸ ¹× ±â¼úµ¿Çâ
Áֿ俬±¸ÅäÇÈ
ÁÖ¿ä°úÁ¦ ¹× ±â°ü
Çؿܱâ°ü °ü·ÃÀÚ·á
¹ÙÀÌ¿À Á¤º¸±â¼ú
ÁÖ¿ä Archive Site
ÄÄÇ»ÅÍiN
¿¬±¸ÀÚ Á¤º¸
¿¬±¸ÀÚ·á
¹®ÀÚ DB
Ȧ·Î±×·¥ DB
¿ë¾î»çÀü
¾Ë¸²¸¶´ç
ºÎ½Ç ÇмúÈ°µ¿ ¿¹¹æ
³í¹®¸ðÁý
´ëȸ¾È³»
What's New
¿¬±¸ºñ Á¤º¸
±¸ÀÎÁ¤º¸
°øÁö»çÇ×
IT Daily
CSERIC ±¤Àå
Post-Conference
¿¬±¸ÀÚ Ä«Æä
ÀÚÀ¯°Ô½ÃÆÇ
Q&A
¼ºñ½º ¹Ù·Î°¡±â
¼³¹®Á¶»ç
¿¬±¸À±¸®
°ü·Ã±â°ü
Please wait....
¿¬±¸¹®Çå
±¹³» ³í¹®Áö
¿µ¹® ³í¹®Áö
±¹³» ÇÐȸÁö
Çмú´ëȸ ÇÁ·Î½Ãµù
±¹³» ÇÐÀ§ ³í¹®
³í¹®Á¤º¸
¹é¼
±¹³» ³í¹®Áö
Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö >
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö
>
Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö ÄÄÇ»ÅÍ ¹× Åë½Å½Ã½ºÅÛ
Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö ÄÄÇ»ÅÍ ¹× Åë½Å½Ã½ºÅÛ
Current Result Document :
4
/ 4
ÀÌÀü°Ç
ÇѱÛÁ¦¸ñ(Korean Title)
ºÎä³Î ºÐ¼® ´ëÀÀÀ» À§ÇÑ 1Â÷ ¸¶½ºÅ· AES ¾Ë°í¸®Áò ÃÖÀûÈ ±¸Çö
¿µ¹®Á¦¸ñ(English Title)
Implementation of Optimized 1st-Order Masking AES Algorithm Against Side-Channel-Analysis
ÀúÀÚ(Author)
±è°æÈ£
¼ÈÁ¤
Kim Kyung Ho
Seo Hwa Jeong
¿ø¹®¼ö·Ïó(Citation)
VOL 08 NO. 09 PP. 0225 ~ 0230 (2019. 09)
Çѱ۳»¿ë
(Korean Abstract)
ÃÖ±Ù »ç¹°ÀÎÅÍ³Ý ±â¼úÀÇ ¹ßÀü°ú ÇÔ²² Çϵå¿þ¾î µð¹ÙÀ̽º¿¡¼ ÃøÁ¤ÇÏ´Â ¼¾½Ì µ¥ÀÌÅ͸¦ º¸È£Çϱâ À§ÇØ ´Ù¾çÇÑ ¹æ½ÄÀÇ ¾ÏÈ£È ¾Ë°í¸®ÁòÀ» äÅÃÇÏ°í ÀÖ´Ù. ±× Áß Àü ¼¼°è¿¡¼ °¡Àå ¸¹ÀÌ »ç¿ëÇÏ´Â ¾ÏÈ£È ¾Ë°í¸®ÁòÀÎ AES(Advanced Encryption Standard) ¶ÇÇÑ °·ÂÇÑ ¾ÈÀü¼ºÀ» ¹ÙÅÁÀ¸·Î ¸¹Àº µð¹ÙÀ̽º¿¡¼ »ç¿ëµÇ°í ÀÖ´Ù. ÇÏÁö¸¸ AES ¾Ë°í¸®ÁòÀº DPA(Differential Power Analysis), CPA(Correlation Power Analysis) °°Àº ºÎä³Î ºÐ¼® °ø°Ý¿¡ Ãë¾àÇÏ´Ù´Â Á¡ÀÌ ¹ß°ßµÇ¾ú´Ù. º» ³í¹®¿¡¼´Â ºÎä³Î ºÐ¼® °ø°Ý ´ëÀÀ¹æ¹ý Áß °¡Àå ³Î¸® ¾Ë·ÁÁø ¸¶½ºÅ· ±â¹ýÀ» Àû¿ëÇÑ AES ¾Ë°í¸®ÁòÀÇ ¼ÒÇÁÆ®¿þ¾î ÃÖÀûÈ ±¸Çö ±â¹ýÀ» Á¦½ÃÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
Recently, with the development of Internet technology, various encryption algorithms have been adopted to protect the sensing data measured by hardware devices. The Advanced Encryption Standard (AES), the most widely used encryption algorithm in the world, is also used in many devices with strong security. However, it has been found that the AES algorithm is vulnerable to side channel analysis attacks such as Differential Power Analysis (DPA) and Correlation Power Analysis (CPA). In this paper, we present a software optimization implementation technique of the AES algorithm applying the most widely known masking technique among side channel analysis attack methods.
Å°¿öµå(Keyword)
AES
ºÎä³Î
¸¶½ºÅ·
ÃÖÀûÈ
AES
Side-Channel-Attack
Masking
Optimization
ÆÄÀÏ÷ºÎ
PDF ´Ù¿î·Îµå
¸ñ·Ï
Copyright(c)
Computer Science Engineering Research Information Center
. All rights reserved.