{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00086735","sets":["6164:6165:6462:6909"]},"path":["6909"],"owner":"11","recid":"86735","title":["KCipher-2への電力解析攻撃対策とその評価"],"pubdate":{"attribute_name":"公開日","attribute_value":"2012-10-23"},"_buckets":{"deposit":"998ffb14-0978-4736-a4db-66a331279822"},"_deposit":{"id":"86735","pid":{"type":"depid","value":"86735","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"KCipher-2への電力解析攻撃対策とその評価","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"KCipher-2への電力解析攻撃対策とその評価"},{"subitem_title":"A countermeasure against power analysis attacks on KCipher-2 and its evaluation","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"ストリーム暗号,KCipher-2,電力解析攻撃,乱数マスキング","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2012-10-23","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"東北大学"},{"subitem_text_value":"東北大学"},{"subitem_text_value":"東北大学"},{"subitem_text_value":"株式会社KDDI研究所"},{"subitem_text_value":"株式会社KDDI研究所"},{"subitem_text_value":"株式会社KDDI研究所"},{"subitem_text_value":"株式会社KDDI研究所"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Tohoku University","subitem_text_language":"en"},{"subitem_text_value":"Tohoku University","subitem_text_language":"en"},{"subitem_text_value":"Tohoku University","subitem_text_language":"en"},{"subitem_text_value":"KDDI R&D Laboratories","subitem_text_language":"en"},{"subitem_text_value":"KDDI R&D Laboratories","subitem_text_language":"en"},{"subitem_text_value":"KDDI R&D Laboratories","subitem_text_language":"en"},{"subitem_text_value":"KDDI R&D Laboratories","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/86735/files/IPSJCSS2012100.pdf"},"date":[{"dateType":"Available","dateValue":"2014-10-23"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2012100.pdf","filesize":[{"value":"527.2 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"5ddec8de-b5af-4ab0-8ff2-b42b1e1f0009","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2012 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"響, 崇史"},{"creatorName":"本間, 尚文"},{"creatorName":"青木, 孝文"},{"creatorName":"仲野, 有登"},{"creatorName":"福島, 和英"},{"creatorName":"清本, 晋作"},{"creatorName":"三宅, 優"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Takafumi, Hibiki","creatorNameLang":"en"},{"creatorName":"Naofumi, Homma","creatorNameLang":"en"},{"creatorName":"Takafumi, Aoki","creatorNameLang":"en"},{"creatorName":"Yuto, Nakano","creatorNameLang":"en"},{"creatorName":"Kazuhide, Fukushima","creatorNameLang":"en"},{"creatorName":"Shinsaku, Kiyomoto","creatorNameLang":"en"},{"creatorName":"Yutaka, Miyake","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"ストリーム暗号KCipher-2への電力解析攻撃対策とその評価について述べる.まず,KCipher-2への電力解析攻撃について概説する.次に,乱数マスキングに基づく対策手法を提案する.提案手法では,非線形関数部の整数演算,Sub関数およびレジスタL1,L2部分にマスクをかけ,L2の出力とFSR-Bでアンマスクを行う.本稿では,90nm-CMOSテクノロジを用いた場合の性能を示し,SASEBO-GIIを用いた攻撃実験によりその有効性を示す.整数演算およびSub関数のアルゴリズムとマスク方法を適切に設計・適用し,対策による面積と遅延の増加をそれぞれ1.5倍,2.5倍程度に抑えられることを示す.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"This paper presents a countermeasure against power analysis attacks on a stream cipher KCipher-2 and its evaluation. The proposed concept is to mask intermediate data passing through internal registers L1 and L2 in the non-linear function part, and then unmask the data at the outputs of L2 and FSR-B. We evaluate the performance of the proposed method through ASIC implementations on a 90 nm CMOS technology. Compared with the unprotected design, the performance overheads in circuit area and delay are increased at most 1.5 and 2.5 times, respectively. We also demonstrate the effectiveness of the countermeasure with a SASEBO-GII platform.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"756","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2012論文集"}],"bibliographicPageStart":"749","bibliographicIssueDates":{"bibliographicIssueDate":"2012-10-23","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3","bibliographicVolumeNumber":"2012"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":86735,"updated":"2025-01-21T17:37:51.324015+00:00","links":{},"created":"2025-01-18T23:37:43.964579+00:00"}