Patent application number | Description | Published |
20100277287 | COMMUNICATION DATA PROTECTION METHOD BASED ON SYMMETRIC KEY ENCRYPTION IN RFID SYSTEM, AND APPARATUS FOR ENABLING THE METHOD - A communication data protection method based on symmetric key encryption, and an apparatus for enabling the method are provided. A communication data protection method using a Radio Frequency Identification (RFID) reader, the method including: receiving, from a tag, tag information including security parameter information and an encrypted Unique Item Identifier (UII); extracting the UII based on the security parameter information; transmitting, to the tag, a request message including a challenge value for replay prevention; and performing a tag authentication by receiving, from the tag, a response message including a handle and the challenge value. | 11-04-2010 |
20110044450 | METHOD AND APPARATUS FOR PROCESSING F-FUNCTION IN SEED ENCRYPTION SYSTEM - An apparatus for processing an F-function in a SEED encryption system includes: an arithmetic operation masking conversion unit for converting a logical operation mask value obtained by performing a logical operation of a SEED F-function input value and a random mask value into an arithmetic operation mask value; and a masking G-function unit for taking the arithmetic operation mask value from the arithmetic operation masking conversion unit as an input and producing an arithmetic operation output. | 02-24-2011 |
20110176678 | MASKING OPERATION METHOD AND DEVICE FOR SYMMETRIC KEY ENCRYPTED SYSTEM - A masking operation method for a symmetric key encryption system includes, when at least two Substitution-boxes (S-boxes) are input, generating a masking S-box table for one S-box which was input; and performing an operation on one masking S-box by referring to the generated masking S-box table. Further, the masking operation method for the symmetric key encryption system includes performing an operation on a remaining masking S-box for a remaining S-box, which was input, by referring to the masking S-box table. | 07-21-2011 |
20110215908 | RADIO SECURITY LEADER CONTROLLING OPERATION MODE, AND RADIO SECURITY TAG SUPPORTING SECURITY MODE AND NORMAL MODE - Disclosed are a radio secure reader and a radio secure tag for supporting a secure mode and a normal mode. The radio secure reader for controlling an operation mode of the radio secure tag may include a reader modem to receive the operation mode from the radio secure tag, and a reader processing unit to identify the received operation mode as a normal mode or a secure mode, and to control the radio secure tag based on the identified operation mode. | 09-08-2011 |
20120039462 | RSA SIGNATURE METHOD AND APPARATUS - A Revest, Shamir and Adleman (RSA) signature method includes: creating an initial hidden value using a private key and an RSA modular; converting a message to a hidden message by blinding the message using the initial hidden value and the RSA modular; obtaining a result value by performing double exponentiation on the hidden message, the initial hidden value, the RSA modular and the private key; and recovering a signature value using the result value. The RSA signature method further includes updating the initial hidden value with a new hidden value after the recovering. | 02-16-2012 |
20120163585 | MASKING ADDITION OPERATION DEVICE FOR PREVENTION OF SIDE CHANNEL ATTACK - A masking addition operation apparatus for prevention of a side channel attack, includes a random value generation unit generating a first random value for a first input, second random value for a second input, and a summation random value. The masking addition operation apparatus includes an operation part performing an operation on the first and second random values, a previous carry input, and first and second masked random values generated based on the first and second random values. The masking addition operation apparatus includes a carry generator generating a carry input using a result of the operation part; and a summation bit generator generating a summation bit using the summation random value, the first and second random values, the previous carry input and the first and second masked random values. | 06-28-2012 |
20130325382 | SIDE-CHANNEL ANALYSIS APPARATUS AND METHOD BASED ON PROFILE - A side channel analysis apparatus based on a profile includes a waveform collection unit configured to collect leaked information from a target device of a side channel analysis; and a preprocessing unit configured to preprocess a waveform data correspond to the leaked information collected from the waveform collection unit before analyzing same. Further, the side channel analysis apparatus includes an analysis unit configured to analyze the waveform data preprocessed in the preprocessing unit; and a profile configuration unit configured to make each process of the waveform collection unit, the preprocessing unit, and the analysis unit into a process and configure a profile for managing each process by connection of each process. | 12-05-2013 |
20140286486 | BLOCK ENCRYPTION METHOD AND APPARATUS - In accordance with an embodiment, the logical exclusive operation on the random number RAND and the OPc value are performed several times, the logical operation and encryption processing using a random number RAND and logical operation and encryption processing using a random number S are done in any order, which brings an increase of an attack complexity as to whether to calculate the correlation coefficient from the power consumption waveform at any point when analyzing the correlation power, whereby it is possible to defend the CPA attack effectively. | 09-25-2014 |
20140307871 | METHOD FOR KEY ESTABLISHMENT USING ANTI-COLLISION ALGORITHM - A method for a key establishment in RFID system using an adaptive Q anti-collision algorithm, the method comprising:generating group key between a reader and a number of tags using values of Q that are changed under the adaptive Q anti-collision algorithm; and creating session keys between the reader and the tags using unique IDs of the respective tags. | 10-16-2014 |
Patent application number | Description | Published |
20100085154 | METHOD AND DEVICE OF FORMING RFID VIRTUAL TAG AND METHOD FOR RECEIVING CONTENTS USING THE SAME - Provided is a radio frequency identification (RFID) tag generating method and device, and a contents receiving method using the same. The contents receiving method using the RFID tag generating device includes: a terminal detecting a virtual tag corresponding to contents; receiving a password to be used once, corresponding to the virtual tag; authenticating a user by determining whether the password to be used once corresponds to a password input by the user; receiving an identification code of the virtual tag when the password to be used once corresponds to a password input by the user; and receiving the contents matching the identification code of the virtual tag, and providing the same to the user. | 04-08-2010 |
20100140361 | RFID TAG - Provided is an RFID tag. When no external pressure is applied to a packaging structure, a wire for transmitting power and data from an antenna is separated from an RFID chip by an air layer. When external pressure is applied to the packaging structure, the wire is connected to the RFID chip to transmit the power and data between the antenna and the RFID chip. | 06-10-2010 |
20100142708 | APPARATUS AND METHOD FOR GENERATING SECRET KEY - An apparatus for generating a secret key generates the secret key by using information of a mobile RFID terminal, transmits the generated secret key to an RFID tag attached on an article, and decrypts a unique item identifier of the article encrypted by using the generated secret key after receiving the unique item identifier of the article encrypted by using the secret key from the RFID tag. By this configuration, it is possible to protect user's personal privacy of the mobile RFID terminal in a state where user's intervention is minimized. | 06-10-2010 |
20100146273 | METHOD FOR PASSIVE RFID SECURITY ACCORDING TO SECURITY MODE - Provided are a method for passive radio frequency identification (RFID) security according to a security mode. An RFID tag transmits its own current security mode to a reader and the reader drives a security protocol depending on the current security mode of the RFID tag. Also, the reader grasps the ability of the tag and then the reader drive a protocol suitable for the ability through the security mode. | 06-10-2010 |
20100150340 | DEVICE AND METHOD FOR ELLIPTIC CURVE CRYPTOSYSTEM - An exemplary embodiment of the present invention provides a method and an apparatus for minimizing a difference in data path between elliptic curve point addition and elliptic curve point doubling. An elliptic curve encryption method includes a first operation step of performing point addition for two points when two points on an elliptic curve are different from each other, and a second operation step of performing point doubling for any one point when two points on the elliptic curve are the same, wherein inverse multiplication processes and multiplication processes of the first operation step and the second operation step have the same path delay. | 06-17-2010 |
20120294439 | METHOD FOR IMPLEMENTING SYMMETRIC KEY ENCRYPTION ALGORITHM AGAINST POWER ANALYSIS ATTACKS - Disclosed is a method for implementing a symmetric key encryption algorithm against power analysis attacks, including: generating and storing an affine transform table; generating and storing a masked inversion table; and operating a masked S-box using the affine transform table and the masked inversion table. | 11-22-2012 |
20150195084 | ONE-BIT TO FOUR-BIT DUAL CONVERSION APPARATUS FOR ENHANCED SECURITY AGAINST SIDE CHANNEL ANALYSIS AND METHOD THEREOF - Disclosed is a dual conversion apparatus for preventing a side channel analysis, including: a microcontroller which converts one-bit expression, which is expressed by zero and one, into one of two four-bit transitions, reconstructs a cryptographic algorithm, and applies the four-bit converted dual conversion to the reconstructed cryptographic algorithm; and a storing unit which stores the four-bit converted dual conversion which is converted by the microcontroller. | 07-09-2015 |
20150210175 | ELECTRIC VEHICLE, AND DEVICE AND METHOD FOR CHARGING SAME - An electric vehicle and a device and method for charging the electric vehicle are disclosed. The device for charging an electric vehicle includes a charger cable communication unit, a charger security unit, and a control unit. The charger cable communication unit receives encrypted electric vehicle charging information from an electric vehicle. The charger security unit decrypts the encrypted electric vehicle charging information. The control unit determines whether the decrypted electric vehicle charging information is identical with charger charging information. The charger security unit encrypts the charger charging information if the control unit of the device for charging an electric vehicle determines that the decrypted electric vehicle charging information is not identical with the charger charging information. The charger cable communication unit sends the encrypted charger charging information to the electric vehicle. The control unit charges the electric vehicle when an acknowledgement message is received from the electric vehicle. | 07-30-2015 |
20150312027 | FUNCTION MASKING APPARATUS IN SYMMETRIC CRYPTOGRAPHIC ALGORITHM FOR PREVENTING SIDE CHANNEL ATTACKS AND METHOD THEREOF - Disclosed is a function masking apparatus in a symmetric cryptographic algorithm for preventing side channel attacks, including: a controller creating lookup tables for one or more internal functions included in a high security and light weight (HIGHT) algorithm, respectively based on a plurality of non-linear functions, a plurality of linear functions, and a plurality of constants which are randomly generated; and a storage unit storing the lookup tables for one or more internal functions included in the generated HIGHT algorithm. | 10-29-2015 |
20150349948 | SIDE CHANNEL ANALYSIS SYSTEM AND SIDE CHANNEL ANALYSIS METHOD USING THE SAME - Disclosed are a side channel analysis system that may facilitate to perform side channel analysis on a device whose dedicated side channel analysis board does not exist such as a smartphone, and a side channel analysis method using the same. The side channel analysis system includes a side channel analysis device that outputs control signals for side channel analysis and performs side channel analysis based on received measurement signals, a device to be analyzed that performs generation and encryption function of optical signals for side channel measurement, according to the control signals provided from the side channel analysis device, an optical sensor module that detects the optical signals generated from the device to be analyzed, and generates and outputs trigger signals according to the detected optical signals, and a signal measurement device that measures waveforms of at least one signal generated according to an encryption operation of the device to be analyzed using the trigger signals output from the optical sensor module, and provides the measured waveforms to the side channel analysis device. | 12-03-2015 |
Patent application number | Description | Published |
20110145595 | SECURE DEVICE AND METHOD FOR PREVENTING SIDE CHANNEL ATTACK - Provided are a secure device and method for preventing a side channel attack. The secure device includes a secure module converting plaintext data received from the outside into ciphertext data to thereby store the converted ciphertext data, or converting stored ciphertext data into plaintext data to thereby output the converted plaintext data, and a side channel attack sensing module sensing a side channel attack upon the secure module, and, according to the sensing result, allowing the secure module to stop operating, inducing malfunctions of the secure module, delaying operations of the secure module, or making the secure module a device having the secure module disabled. The secure device can safely protect an internal security algorithm and data from the side channel attack. | 06-16-2011 |
20130003968 | METHOD AND APPARATUS FOR GENERATING SESSION KEY AND CLUSTER KEY - Disclosed herein are a method and apparatus for generating a session key and a cluster key using a network coding scheme. The apparatus includes a random number generation unit, a combination generation unit, a combination transmission unit, a coding result reception unit, and a restoration unit. The random number generation unit generates the random number of a node. The combination generation unit generates a combination based on a master key of the node and the random number. The combination transmission unit transfers the combination to a key distribution server. The coding result reception unit receives a result of a network coding, corresponding to an ID of the node, from the key distribution server. The restoration unit for generating a session key by restoring a random number, corresponding to a counterpart node of the node, using the result of the network coding and the random number. | 01-03-2013 |
20130208886 | METHOD OF PREVENTING FAULT-INJECTION ATTACKS ON CHINESE REMAINDER THEOREM-RIVEST SHAMIR ADLEMAN CRYPTOGRAPHIC OPERATIONS AND RECORDING MEDIUM FOR STORING PROGRAM IMPLEMENTING THE SAME - Disclosed herein are a method of preventing fault-injection attacks on Chinese Remainder Theorem (CRT)-Rivest Shamir Adleman (RSA) cryptographic operations, and a recording medium for storing a program implementing the same. First, the method receives first and second primes, that is, different primes, and a randomly selected prime, that is, a random prime, which are used for CRT-RSA cryptographic operations. Thereafter, a cumulative value is calculated by performing an XOR (Exclusive OR) operation on the first prime, the second prime, and the random prime using a push function. Thereafter, the first prime, the second prime, and the random prime are loaded by performing an XOR operation on the cumulative value using a pop function corresponding to the push function. Finally, CRT-RSA operations are executed by computing modulo operations based on the first prime and the second prime. | 08-15-2013 |
20150127953 | ENCODING APPARATUS AND METHOD - Provided is an encoding apparatus including a communication unit configured to receive data from an outside, a memory configured to store an instruction for encoding the data, and a processor configured to encode the data according to the instruction, in which the instruction includes an instruction for encoding the data using a first table for looking up and calculating a result value obtained by encoding according to a predetermined pattern in an a-th round, and when among first to fourth data included in data obtained by encoding through the first table, an i-th bit of exclusive OR of the second to fourth data and a j-th bit of the first data are different, an instruction for encoding the data using a second table for looking up and calculating a result value calculated by performing additional encoding on exclusive OR of the first to fourth data. | 05-07-2015 |