scholarly journals A New Type of Countermeasure against DPA in Multi-Sbox of Block Cipher

2018 ◽  
Vol 2018 ◽  
pp. 1-11
Author(s):  
Shuaiwei Zhang ◽  
Weidong Zhong

The Internet of Things (IoT) provides the network for physical devices, like home appliances, embedded with electronics, sensors, and software, to share and exchange data. With its fast development, security of IoT has become a crucial problem. Among the methods of attack, side-channel attack has proven to be an effective tool to compromise the security of different devices with improving techniques of data processing, like DPA and CPA. Meanwhile, many countermeasures have risen accordingly as well, such as masking and noise addition. However, their common deficiency was that every single countermeasure might not be able to protect the key information completely after statistical analysis. Sensitive information will be disclosed during differential power analysis of Sbox, since it is the only nonlinear component in block cipher. Thus, how to protect Sbox effectively was the highlight of researches. Based on Sbox-reuse concept proposed by Bilgin, this paper put forward a new type of a countermeasure scheme against DPA in multi-Sbox of block cipher. We first converted the multi-Sbox into 4 × 4 permutations and then reused permutation with the algebraic degree of more than one so as to turn it into a special reusable Sbox and then numbered 4 × 4 permutation input. Finally, we made these inputs of permutations completely random by masking. Since it was necessary to make the collected power consumption curve subject to alignment process in DPA by chosen-plaintext attack, this scheme combined the concept from DPA countermeasures of masking and noise addition. After the experiment with the proposed implementation, successful prevention of the attacker from accurately aligning the power consumption curve of the target Sbox has been proven, and the level of security has been improved by adding more random noise to protect key information and decrease the accuracy of statistical analysis.

Author(s):  
А. Voloshko ◽  
Ya. Bederak ◽  
T. Dzheria

Aims of this research are development of a complex statistical analysis algorithm for active electric power consumption data, consumption of energy resources and manufacturing products, implementation of statistical analysis in practice. Proposed parameters and criteria, which can help to technical staff in factories, to provide optimal and economical operating of supply and distribution systems as electricity, water, gas, heat, compressed air, etc. for production facilities, based on the collected active electric power consumption data for previous periods, information about consumption dynamic. It is concluded that the statistical analysis of the data, obtained for each type of engineering equipments (water supply and sewage, supply systems of compressed air, gas, electricity and steam) and various consumables coefficients (in the proposed algorithm) make possible to identify "weak areas" and to determine the most rational ways to optimize energy usage.


Energies ◽  
2020 ◽  
Vol 13 (7) ◽  
pp. 1763 ◽  
Author(s):  
Haiqing Liu ◽  
Zhiqiao Li ◽  
Yuancheng Li

In recent years, various types of power theft incidents have occurred frequently, and the training of the power-stealing detection model is susceptible to the influence of the imbalanced data set and the data noise, which leads to errors in power-stealing detection. Therefore, a power-stealing detection model is proposed, which is based on Improved Conditional Generation Adversarial Network (CWGAN), Stacked Convolution Noise Reduction Autoencoder (SCDAE) and Lightweight Gradient Boosting Decision Machine (LightGBM). The model performs Generation- Adversarial operations on the original unbalanced power consumption data to achieve the balance of electricity data, and avoids the interference of the imbalanced data set on classifier training. In addition, the convolution method is used to stack the noise reduction auto-encoder to achieve dimension reduction of power consumption data, extract data features and reduce the impact of random noise. Finally, LightGBM is used for power theft detection. The experiments show that CWGAN can effectively balance the distribution of power consumption data. Comparing the detection indicators of the power-stealing model with various advanced power-stealing models on the same data set, it is finally proved that the proposed model is superior to other models in the detection of power stealing.


2017 ◽  
Vol 2017 ◽  
pp. 1-5 ◽  
Author(s):  
Nurhat Ozkalayci ◽  
Orhan Cicek

Objective. The aim of this study is to evaluate the factors that affect wearing time and patient behavior during reverse pull headgear therapy with a newly designed reverse pull headgear.Methods. In clinical practice, new reverse pull headgears were applied to fifteen patients. The patients were monitored during reverse pull headgear therapy and the data were evaluated. Statistical analysis was made.Results. During the study, patients were monitored successfully and the evaluations showed that patients wear the new reverse pull headgears mostly at night. There are differences between days of week and hours of day. Weekends are more popular than weekdays for wearing reverse pull headgear.Conclusions. This new type of reverse pull headgears can be used successfully in clinical practice and can help the clinician. Study showed that the most important factor that affects the cooperation of reverse pull headgear patient is aesthetic appearance.


2013 ◽  
Vol 329 ◽  
pp. 316-319
Author(s):  
Lei Zhou ◽  
Hong Zhao ◽  
Qing Zhao

The Temperature Rise Test of Low Voltage Switchgear Assembly has rather high requirements for the test equipment; however, the present test equipment commonly has the problem of complicated test circuits, current regulation difficulty, high power consumption etc [. Therefore, in order to raise the present test level, we have devised new test methods and designed a new type of current adjusting device for the Temperature Rise Test. This new type of device has the advantages of easy operation, compact structure, flexible motion, low power consumption, low cost, high precision etc. Practical application has proved that it can meet the technical requirements for the Temperature Rise Test of Low Voltage Switchgear Assembly.


2013 ◽  
Vol 333-335 ◽  
pp. 2412-2416
Author(s):  
Jin Feng Yan ◽  
Ming Deng ◽  
Yan Jun Li ◽  
Qi Sheng Zhang

SoPC technology is a high-performance, low-power consumption embedded system solution based on embedded microprocessor, providing a new way for developing new type centralized engineering seismograph. The paper presents the development of a new type centralized engineering seismograph based on SoPC technology, which adopts FPGA design based on SoPC technology for the hardware design and embedded software program development of the 48-channel engineering seismograph. According to actual needs of currently available centralized engineering seismograph, combining the actual characteristics of SoPC embedded technology, a portable, low-power consumption and high-performance new type centralized engineering seismograph is constructed. The paper describes the hardware design and software program implementation of the centralized engineering seismograph in detail.


2013 ◽  
Vol 411-414 ◽  
pp. 125-130
Author(s):  
Yan Bo Niu ◽  
An Ping Jiang

SM4 is a 128-bit block cipher used in SOC and smart cards to ensure the safety of data transmission. In order to realize a low power implementation of the SM4 cipher block, some S-boxes were evaluated firstly and we proposed a new architecture of SM4 S-box called MUX S-box with a power consumption of 13.92W@10Mhz on SMIC 0.18m technology, Meanwhile, the implementation of SM4 cipher round based on the SM4 MUX S-box was completed and a low power consumption of 0.33mW @ 10 MHz on 0.18 m CMOS technology is achieved.


2020 ◽  
Vol 2 (1) ◽  
pp. 178-188
Author(s):  
Francis Ndegwa; Eliud Kirigia; Pauline Ndoro; Vicky Khasandi

The study examines the sexuality communication between the clergy and adolescents in Nakuru County, Kenya. The study uses Systems theory anchored by Ludwing Von Bertalanffy (1969). Eighty students were sampled from ten secondary schools in Nakuru East and Njoro sub-counties representing both urban and rural teacher population. The schools included six same-sex secondary (three only boys and three only girls) schools and four mixed-sex secondary schools. The categories of the schools included two national schools, three extra-county schools, three county schools and two sub-county schools. The study used a self-administered questionnaire as a method of data collection, which was appropriate for collecting sensitive information such as sexual communication yet provide quantifiable data that can be used for statistical analysis. The schools were categorized from letter A to J. The results of this study showed that although the clergy engage the adolescents in some sexuality communication, the sexuality information communicated by the clergy was insufficient to help them manage the sexuality challenges they encounter. This is partly because adolescents did not consider their interests as fully taken into account since the clergy used strategies that were convenient for them, but failed to address the adolescents’ needs. The study suggested that clergy should be more accommodative of the views of the adolescents by considering the feedback regarding their interests and concerns. A good system will seek balance through interchanging with its environment and this comes through those feedback loops that enlighten the system on how or what to modify in order to maintain the system balance.


2017 ◽  
Vol 7 (3) ◽  
pp. 17-51 ◽  
Author(s):  
Cynthia Dwork ◽  
Frank McSherry ◽  
Kobbi Nissim ◽  
Adam Smith

We continue a line of research initiated in Dinur and Nissim (2003); Dwork and Nissim (2004); and Blum et al. (2005) on privacy-preserving statistical databases. Consider a trusted server that holds a database of sensitive information. Given a query function $f$ mapping databases to reals, the so-called {\em true answer} is the result of applying $f$ to the database. To protect privacy, the true answer is perturbed by the addition of random noise generated according to a carefully chosen distribution, and this response, the true answer plus noise, is returned to the user. Previous work focused on the case of noisy sums, in which $f = \sum_i g(x_i)$, where $x_i$ denotes the $i$th row of the database and $g$ maps database rows to $[0,1]$. We extend the study to general functions $f$, proving that privacy can be preserved by calibrating the standard deviation of the noise according to the {\em sensitivity} of the function $f$. Roughly speaking, this is the amount that any single argument to $f$ can change its output. The new analysis shows that for several particular applications substantially less noise is needed than was previously understood to be the case. The first step is a very clean definition of privacy---now known as differential privacy---and measure of its loss. We also provide a set of tools for designing and combining differentially private algorithms, permitting the construction of complex differentially private analytical tools from simple differentially private primitives. Finally, we obtain separation results showing the increased value of interactive statistical release mechanisms over non-interactive ones.


Sign in / Sign up

Export Citation Format

Share Document