scholarly journals Side Channel Leakages Against Financial IC Card of the Republic of Korea

2018 ◽  
Vol 8 (11) ◽  
pp. 2258 ◽  
Author(s):  
Yoo-Seung Won ◽  
Jonghyeok Lee ◽  
Dong-Guk Han

Integrated circuit (IC) chip cards are commonly used in payment system applications since they can provide security and convenience simultaneously. More precisely, Europay, MasterCard, and VISA (EMV) are widely known to be well equipped with security frameworks that can defend against malicious attacks. On the other hand, there are other payment system applications at the national level. In the case of the Republic of Korea, standards for financial IC card specifications are established by the Korea Financial Telecommunications and Clearings Institute. Furthermore, security features defending against timing analysis, power analysis, electromagnetic analysis, and TEMPEST are required. This paper identifies side channel leakages in the financial IC cards of the Republic of Korea, although there may be side channel countermeasures. Side channel leakages in the financial IC cards of the Republic of Korea are identified for the first time since the side channel countermeasures were included in the standards. The countermeasure that is applied to the IC card from a black box perspective is estimated to measure security features against power analysis. Then, in order to investigate whether an underlying countermeasure is applied, first-order and second-order power analyses are performed on the main target, e.g., a S-box of the block cipher SEED that is employed in the financial system. Furthermore, the latest proposal in ICISC 2017 is examined to apply block cipher SEED to the financial IC card protocol. As a result, it is possible to identify some side channel leakages while expanding the lemma of the paper accepted in ICISC 2017. Algebraic logic is also constructed to recover the master key from some round keys. Finally, it is found that only 20,000 traces are required to find the master key.

Electronics ◽  
2021 ◽  
Vol 10 (12) ◽  
pp. 1438
Author(s):  
Krithika Dhananjay ◽  
Emre Salman

SIMON is a block cipher developed to provide flexible security options for lightweight hardware applications such as the Internet-of-things (IoT). Safeguarding such resource-constrained hardware from side-channel attacks poses a significant challenge. Adiabatic circuit operation has recently received attention for such applications due to ultra-low power consumption. In this work, a charge-based methodology is developed to mount a correlation power analysis (CPA) based side-channel attack to an adiabatic SIMON core. The charge-based method significantly reduces the attack complexity by reducing the required number of power samples by two orders of magnitude. The CPA results demonstrate that the required measurements-to-disclosure (MTD) to retrieve the secret key of an adiabatic SIMON core is 4× higher compared to a conventional static CMOS based implementation. The effect of increase in the target signal load capacitance on the MTD is also investigated. It is observed that the MTD can be reduced by half if the load driven by the target signal is increased by 2× for an adiabatic SIMON, and by 5× for a static CMOS based SIMON. This sensitivity to target signal capacitance of the adiabatic SIMON can pose a serious concern by facilitating a more efficient CPA attack.


Author(s):  
L. Kupina

The article studies main agreements regulating trade and economic relations between the Republic of Korea and the countries of Central Asia, taking into account the dynamics of bilateral relations between them. The author also looks into the prospects and effectiveness of the development of multilateral cooperation between the Republic of Korea and the EAEU. Moreover, the author highlights the problems that slow down the development of commercial ties between South Korean and Central Asian business companies. Their resolution depends on economic and political initiatives at the national level in the Central Asian republics.


Author(s):  
Francesco Berti ◽  
Shivam Bhasin ◽  
Jakub Breier ◽  
Xiaolu Hou ◽  
Romain Poussier ◽  
...  

OCB3 is one of the winners of the CAESAR competition and is among the most popular authenticated encryption schemes. In this paper, we put forward a fine-grain study of its security against side-channel attacks. We start from trivial key recoveries in settings where the mode can be attacked with standard Differential Power Analysis (DPA) against some block cipher calls in its execution (namely, initialization, processing of associated data or last incomplete block and decryption). These attacks imply that at least these parts must be strongly protected thanks to countermeasures like masking. We next show that if these block cipher calls of the mode are protected, practical attacks on the remaining block cipher calls remain possible. A first option is to mount a DPA with unknown inputs. A more efficient option is to mount a DPA that exploits horizontal relations between consecutive input whitening values. It allows trading a significantly reduced data complexity for a higher key guessing complexity and turns out to be the best attack vector in practical experiments performed against an implementation of OCB3 in an ARM Cortex-M0. Eventually, we consider an implementation where all the block cipher calls are protected. We first show that exploiting the leakage of the whitening values requires mounting a Simple Power Analysis (SPA) against linear operations. We then show that despite being more challenging than when applied to non-linear operations, such an SPA remains feasible against 8-bit implementations, leaving its generalization to larger implementations as an interesting open problem. We last describe how recovering the whitening values can lead to strong attacks against the confidentiality and integrity of OCB3. Thanks to this comprehensive analysis, we draw concrete requirements for side-channel resistant implementations of OCB3.


2020 ◽  
Vol 55 (1) ◽  
pp. 71-97 ◽  
Author(s):  
Jong-Haeng Yoon

Author(s):  
Huiqian JIANG ◽  
Mika FUJISHIRO ◽  
Hirokazu KODERA ◽  
Masao YANAGISAWA ◽  
Nozomu TOGAWA

Author(s):  
Zorica Saltirovska Professor ◽  
Sunchica Dimitrijoska Professor

Gender-based violence is a form of discrimination that prevents women from enjoying the rights and liberties on an equal level with men. Inevitably, domestic violence shows the same trend of victimizing women to such a degree that the term “domestic violence” is increasingly becoming synonymous with “violence against women”. The Istanbul Convention defines domestic violence as "gender-based violence against women", or in other words "violence that is directed against a woman because she is a woman or that affects women disproportionately." The situation is similar in the Republic of Macedonia, where women are predominantly victims of domestic violence. However, the Macedonian legal framework does not define domestic violence as gender-based violence, and thus it does not define it as a specific form of discrimination against women. The national legislation stipulates that victims are to be protected in both a criminal and a civil procedure, and the Law on Prevention and Protection from Domestic Violence determines the actions of the institutions and civil organizations in the prevention of domestic violence and the protection of victims. The system for protection of victims of domestic violence closely supports the Law on Social Protection and the Law on Free Legal Aid, both of which include provisions on additional assistance for women victims of domestic violence. However, the existing legislation has multiple deficiencies and does not allow for a greater efficacy in implementing the prescribed measures for the protection of victims of domestic violence. For this reason, as well as due to the inconsistent implementation of legal solutions of this particular issue, the civil sector is constantly expressing their concern about the increasingly wider spread of domestic violence against women and about the protection capabilities at their disposal. The lack of recognition of all forms of gender-based violence, the trivial number of criminal sentences against persons who perform acts of domestic violence, the insufficient support offered to victims – including victim shelters, legal assistance, and counseling, and the lack of systematic databases on domestic violence cases on a national level, are a mere few of the many issues clearly pointing to the inevitable conclusion that the protection of women-victims of domestic violence is inadequate. Hence, the functionality and efficiency of both the existing legislation and the institutions in charge of protection and support of women – victims of domestic violence is being questioned, which is also the subject for analysis in this paper.


Sign in / Sign up

Export Citation Format

Share Document