316 research outputs found

    Asymmetric Leakage from Multiplier and Collision-Based Single-Shot Side-Channel Attack

    Get PDF
    The single-shot collision attack on RSA proposed by Hanley et al. is studied focusing on the difference between two operands of multiplier. It is shown that how leakage from integer multiplier and long-integer multiplication algorithm can be asymmetric between two operands. The asymmetric leakage is verified with experiments on FPGA and micro-controller platforms. Moreover, we show an experimental result in which success and failure of the attack is determined by the order of operands. Therefore, designing operand order can be a cost-effective countermeasure. Meanwhile we also show a case in which a particular countermeasure becomes ineffective when the asymmetric leakage is considered. In addition to the above main contribution, an extension of the attack by Hanley et al. using the signal-processing technique of Big Mac Attack is presented

    A Matter of Imperial Defence: Arthur Balfour and the Anglo-Japanese Alliance, 1894-1923

    Get PDF
    This thesis investigates Arthur Balfour’s policy towards Japan and the Anglo-Japanese alliance from 1894 to 1923. Although Balfour was involved in the Anglo-Japanese alliance from its signing to termination, no comprehensive analysis of his role in the alliance has been carried out. Utilising unpublished materials and academic books, this thesis reveals that Balfour’s policy on the Anglo-Japanese alliance revolved around two vital principles, namely imperial defence and Anglo-American cooperation. From the viewpoint of imperial defence, Balfour emphasised the defence of India and Australasia more than that of China. He opposed the signing of the Anglo-Japanese alliance of 1902 because it was not useful in the defence of India. The Russo-Japanese War raised the concern of Indian security. Changing his lukewarm attitude, Balfour took the initiative in extending the alliance into India to employ Japanese troops for the defence of India. Moreover, as an advocate of Anglo-American cooperation, Balfour made every effort to maintain good Anglo-American-Japanese relations. However, imperial defence and Anglo-American cooperation began to clash within the alliance during the Great War. Although the Siberian intervention was useful Japanese military assistance in the defence of India, America, who was not interested in India, hesitated to support it due to her suspicion against Japan. After the war, the alliance was still instrumental in defending India and Australasia, but its existence damaged the relations with America. Balfour tried to achieve both imperial defence and Anglo-American cooperation by developing the alliance into an Anglo-American-Japanese trilateral agreement with a military clause to revive a bilateral defensive alliance. But America and Japan did not support Balfour’s plan at the Washington Conference, and he had to accept the Four-Power Treaty without any military commitment

    Q-Class Authentication System for Double Arbiter PUF

    Get PDF
    Physically Unclonable Function (PUF) is a cryptographic primitive that is based on physical property of each entity or Integrated Circuit (IC) chip. It is expected that PUF be used in security applications such as ID generation and authentication. Some responses from PUF are unreliable, and they are usually discarded. In this paper, we propose a new PUF-based authentication system that exploits information of unreliable responses. In the proposed method, each response is categorized into multiple classes by its unreliability evaluated by feeding the same challenges several times. This authentication system is named Q-class authentication, where Q is the number of classes. We perform experiments assuming a challenge-response authentication system with a certain threshold of errors. Considering 4-class separation for 4-1 Double Arbiter PUF, it is figured out that the advantage of a legitimate prover against a clone is improved form 24% to 36% in terms of success rate. In other words, it is possible to improve the tolerance of machine-learning attack by using unreliable information that was previously regarded disadvantageous to authentication systems
    corecore