In cryptography, a side channel attack is any attack based on information gained from the physical implementation of a cryptosystem, rather than brute force or theoretical weaknesses in the algorithms (compare cryptanalysis). For example, timing information, power consumption, electromagnetic leaks or even sound can provide an extra source of information which can be exploited to break the system. Many side channel attacks require considerable technical knowledge of the internal operation of the system on which the cryptography is implemented. In this paper, we suggest safety evaluation scheme regarding side channel analysis could apply in smart card product evaluation.
목차
Abstract 1. Introduction 2. Side-Channel Attacks 2.1 Timing Attack (TA) 2.2 Fault Attack (FA) 2.3 Power Analysis Attack 2.4 Electromagnetic Attack 2.5 Error Message Attack 3. Analysis of Evaluation scheme relative with Side-Channel Attacks 3.1 CC (Common Criteria) 3.2 Smart Card Protection Profile 4. Suggest of Evaluation Basis for Side-Channel Analysis in CC 5. Conclusions References
키워드
CC (Common Criteria)Side-Channel AttackSmart Card
저자
Young-Hwan [ Korea Institute of Science and Technology Information, 305-806. ]
Bang, Kab-Seung [ Department of Computer Engineering, Hannam University, 306-791. ]
Kou, Gang-Soo Lee [ Professor, Department of Computer Engineering, Hannam University, 306-791. ]
Corresponding Author
1. 보안공학에 대한 각종 조사 및 연구
2. 보안공학에 대한 응용기술 연구 및 발표
3. 보안공학에 관한 각종 학술 발표회 및 전시회 개최
4. 보안공학 기술의 상호 협조 및 정보교환
5. 보안공학에 관한 표준화 사업 및 규격의 제정
6. 보안공학에 관한 산학연 협동의 증진
7. 국제적 학술 교류 및 기술 협력
8. 보안공학에 관한 논문지 발간
9. 기타 본 회 목적 달성에 필요한 사업