Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Aesun Park is active.

Publication


Featured researches published by Aesun Park.


international carnahan conference on security technology | 2012

CPA performance comparison based on Wavelet Transform

Aesun Park; Dong-Guk Han; Jeong Choon Ryoo

Correlation Power Analysis (CPA) is a very effective attack method for finding secret keys using the statistical features of power consumption signals from cryptosystems. However, the power consumption signal of the encryption device is greatly affected or distorted by noise arising from peripheral devices. When a side channel attack is carried out, this distorted signal, which is affected by noise and time inconsistency, is the major factor that reduces the attack performance. A signal processing method based on the Wavelet Transform (WT) has been proposed to enhance the attack performance. Selecting the decomposition level and the wavelet basis is very important because the CPA performance based on the WT depends on these two factors. In this paper, the CPA performance, in terms of noise reduction and the transform domain, is compared and analyzed from the viewpoint of attack time and the minimum number of signals required to find the secret key. In addition, methods for selecting the decomposition level and the wavelet basis using the features of power consumption are proposed, and validated through experiments.


hardware oriented security and trust | 2016

Chosen ciphertext Simple Power Analysis on software 8-bit implementation of ring-LWE encryption

Aesun Park; Dong-Guk Han

Post-quantum cryptographic schemes have been developed in response to the rise of quantum computers. Fortunately, several schemes have been developed with quantum resistance. However, it is not surprising that implementations of post-quantum cryptographic schemes are vulnerable to Side Channel Analysis (SCA) attacks because post-quantum cryptographic schemes will require implementation on the same platforms which are widely used in the industrial field. SCA attack method and their countermeasures for code-based post-quantum cryptosystem, such as McEliece, have been investigated. Unfortunately, the investigation of the ring-LWE problem in terms of SCA is as yet insufficient. There has only been limited research on the side-channel vulnerabilities of lattice-based implementations. In this paper, we propose the first Simple Power Analysis (SPA) attack on the ring-LWE encryption scheme. The proposed attack exploits the chosen ciphertext and the vulnerability associated with the modular addition, which is applicable when a ring-LWE encryption scheme operates on 8-bit microcontroller devices. We also identify the vulnerability associated with the modular addition operation of 8-bit implementation. When operating a ring-LWE encryption scheme on an 8-bit device, the secret key can be revealed via this vulnerability using the proposed chosen-ciphertext SPA attack.


information security and cryptology | 2016

Analysis of 27MHz Wireless Keyboard Electromagnetic Signal Using USRP and GNU Radio

Ho-Yeon Kim; Bo-Yeon Sim; Aesun Park; Dong-Guk Han

Nowadays, electronic device is in a close relationship with human life. Above all, the use of wireless electronic devices such as smart phone, tablet pc, and wireless keyboard is increasing owing to the high convenience and portability. Furthermore, according to the increasing use of sensitive personal and financial information from the electronic device, various attacks for stealing information are being reported. In this paper we do an analysis of 27MHz wireless keyboard vulnerability and set up an analysis environment. Moreover, we make an experiment and show that there are real vulnerabilities. An experimental result will be used for safety analysis and vulnerability verification of wireless electronic devices.


cryptographic hardware and embedded systems | 2018

Side-Channel Attacks on Post-Quantum Signature Schemes based on Multivariate Quadratic Equations

Aesun Park; Kyung-Ah Shim; Namhun Koo; Dong-Guk Han

In this paper, we investigate the security of Rainbow and Unbalanced Oil-and-Vinegar (UOV) signature schemes based on multivariate quadratic equations, which is one of the most promising alternatives for post-quantum signature schemes, against side-channel attacks. We describe correlation power analysis (CPA) on the schemes that yield full secret key recoveries. First, we identify a secret leakage of secret affine maps S and T during matrix-vector products in signing when Rainbow is implemented with equivalent keys rather than random affine maps for optimal implementations. In this case, the simple structure of the equivalent keys leads to the retrieval of the entire secret affine map T. Next, we extend the full secret key recovery to the general case using random affine maps via a hybrid attack: after recovering S by performing CPA, we recover T by mounting algebraic key recovery attacks. We demonstrate how this leakage on Rainbow can be practically exploited on an 8-bit AVR microcontroller using CPA. Consequently, our CPA can be applied to Rainbow-like multi-layered schemes regardless of the use of the simple-structured equivalent keys and UOV-like single layer schemes with the implementations using the equivalent keys of the simple structure. This is the first result on the security of multivariate quadratic equations-based signature schemes using only CPA. Our result can be applied to Rainbow-like multi-layered schemes and UOV-like single layer schemes submitted to NIST for Post-Quantum Cryptography Standardization.


international conference on information security and cryptology | 2017

Novel Leakage Against Realistic Masking and Shuffling Countermeasures

Yoo-Seung Won; Aesun Park; Dong-Guk Han

It is often considered reasonable to combine first-order Boolean masking and shuffling countermeasures. However, shuffling countermeasures can sometimes be applied only to some rounds to improve performance. Herein, we define combinations of partial shuffling and masking countermeasures as restricted shuffling and masking countermeasures.


information security and cryptology | 2016

Building of Remote Control Attack System for 2.4 GHz Wireless Keyboard Using an Android Smart Phone

Su-Jin Lee; Aesun Park; Bo-Yeon Sim; Sang-su Kim; Seung-Sup Oh; Dong-Guk Han

It has been steadily increasing to use a wireless keyboard via Radio Frequency which is the input device. Especially, wireless keyboards that use 2.4 GHz frequency band are the most common items and their vulnerabilities have been reported since 2010. In this paper, we propose a 2.4 GHz wireless keyboard keystroke analysis and injection system based on the existing vulnerability researches of the Microsoft 2.4 GHz wireless keyboards. This system is possible to control on the remote. We also show that, via experiments using our proposed system, sensitive information of user can be revealed in the real world when using a 2.4 GHz wireless keyboard.


The Transactions of the Korean Institute of Electrical Engineers | 2016

Vulnerability Verification of 27 ㎒ Wireless Keyboards

Ho-Yeon Kim; Bo-Yeon Sim; Aesun Park; Dong-Guk Han

Internet generalization has led to increased demands for Internet banking. Various security programs to protect authentication information are being developed; however, these programs cannot protect the wireless communication sections of wireless keyboards. In particular, vulnerabilities have been reported in the radio communication sections of 27 ㎒ wireless keyboards. In this paper, we explain how to analyze M’s 27 ㎒ wireless keyboard. We also experimentally show that an attacker can acquire authentication information during domestic Internet banking using a 27 ㎒ wireless keyboard. To do this, we set up an experimental encironment to analyze the electromagnetic signal of a 27 ㎒ wireless keyboard.


information security and cryptology | 2015

A Simple Power Analysis Attack on ARIA Key Expansion Based on Hamming Weight Leakage

Aesun Park; Dong-Guk Han; Jun Choi

ABSTRACT The symmetric key encryption algorithms, such as the AES or the ARIA, generate round keys by the key expansion mechanism. While the algorithm is executed, key expansion mecha nism emits information about the secret key by the power consumption. The vulnerability exists that can reduce significa ntly the candidate of the secret key by the simple power analys is attack using a small number of the power traces. Therefore, we’ll have to study about the attack and the countermeasure to prevent information leakage. While a simple power analysis attack on the AES key expansion has been studied since 2002, ARIA is insufficient. This paper presents a simple power analysis attack on 8-bit implementations of the ARIA-128 key expansion. The presented attack efficiently utilizes this information leakage to substantially reduce the key space that needs to be considered in a brute-force search for the secret key. We sh ow that ARIA is vulnerable to a SPA attack based on hamming weight leakage.Keywords: Side-Channel Analysis, Simple Power Analysis, ARIA key expansi on


information security and cryptology | 2014

A Study on CPA Performance Enhancement using the PCA

Sang-Su Baek; Seung-Kyu Jang; Aesun Park; Dong-Guk Han; Jae-Cheol Ryou

ABSTRACT Correlation Power Analysis (CPA) is a type of Side-Channel Anal ysis (SCA) that extracts the secret key using the correlation coefficient both side-channel information leakage by cryptograp hy device and intermediate value of algorithms. Attack performance of the CPA is affected by noise and temporal synchr onization of power consumption leaked. In the recent years, various researches about the signal processing have been presen ted to improve the performance of power analysis. Among these signal processing techniques, compression techniques of the sig nal based on Principal Component Analysis (PCA) has been presented. Selection of the principal components is an importan t issue in signal compression based on PCA. Because selection of the principal component will affect the performance of the analysis. In this paper, we present a method of selecting the principal component by using the correlation of the principal c omponents and the power consumption is high and a CPA technique based on the principal component that utilizes the fe ature that the principal component has different. Also, we prov e the performance of our method by carrying out the experiment. Keywords: Side-Channel Attack, Correlation Power Analysis, Principal Comp onent Analysis 접수일(2014년 9월 2일), 수정일(2014년 10월 8일, ), 게재확정일(2014년 10월 8일)* 본 연구는 2013년도 정부(교육부)의 재원으로 한국연구재단의 지원을 받아 수행된 기초연구사업임(NRF-2013R1A1A2A10062137)†주저자, [email protected]‡교신저자, [email protected](Corresponding author)


The Kips Transactions:partc | 2012

Side-channel Attack on the Final Round SHA-3 Candidate Skein

Aesun Park; Jong-Yeon Park; Dong-Guk Han; Okyeon Yi

Due to the absence of an alternative algorithm SHA-2, NIST (National Institute of Standards and Technology) is proceeding to development project of SHA-3. NIST announced five candidates of the final round at the end of 2010. Side-channel attack scenarios of five candidates for SHA-3 final round have been proposed. In this paper, we prove the possibility of the analysis against 32-bit modular addition by 8-bit blocks from our experiment on ARM chip board with a register size of 32-bit. In total we required 9700 power traces to successfully recover the 128-bit secret key for the attack against.

Collaboration


Dive into the Aesun Park's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jae-Cheol Ryou

Chungnam National University

View shared research outputs
Top Co-Authors

Avatar

Jeong Choon Ryoo

Korea National Defense University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge