earticle

논문검색

Analysis on Cryptographic Module Validation Testing for Side-Channel Attacks

원문정보

Young-Hwan Bang, Kab-Seung Kou, Gang-Soo Lee

피인용수 : 0(자료제공 : 네이버학술정보)

초록

영어

In cryptography module, a side-channel attack is any attack based on information gained from the physical implementation of a cryptosystem, rather than brute force or theoretical weaknesses in the algorithms (compare cryptanalysis). For example, timing information, power consumption, electromagnetic leaks or even sound can provide an extra source of information which can be exploited to break the system. So the advanced many countries are conducting CMVP (Cryptographic Module Validation Program) to manage cryptographic module of safe IT product. But, systematic method that CMVP is such yet is unprepared.
In this paper, we survey about method of side-channel attack and analysis tools about side-channel attack. And we analysis PP (Protection Profile) in CC (Common Criteria) of smart card, identity card, electric money card and electric passport. Finally we suggest safety evaluation method about side-channel attack in CMVP.

목차

Abstract
 1. Introduction
 2. What is the Side-Channel Attack?
  2.1 Timing Attack (TA)
  2.2 Fault Attack (FA)
  2.3 Power Analysis Attack
 3. Analysis of Evaluation scheme relative with Side-Channel Attacks
  3.1 CMVP (Cryptographic Module Validation Program)
  3.2 Smart Card Protection Profile
 4. Analysis of Testing Tool
  4.1 Sideways
  4.2 Brightlight
  4.3 Inspector
  4.4 PINPAS
  4.5 Comparison and Analysis
 5. Conclusions
 References

저자정보

  • Young-Hwan Bang Korea Institute of Science and Technology Information
  • Kab-Seung Kou Department of Computer Engineering, Hannam University
  • Gang-Soo Lee Professor, Department of Computer Engineering, Hannam University

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.