Patents by Inventor Doo Ho Choi

Doo Ho Choi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8681985
    Abstract: A masking operation method for a symmetric key encryption system includes, when at least two Substitution-boxes (S-boxes) are input, generating a masking S-box table for one S-box which was input; and performing an operation on one masking S-box by referring to the generated masking S-box table. Further, the masking operation method for the symmetric key encryption system includes performing an operation on a remaining masking S-box for a remaining S-box, which was input, by referring to the masking S-box table.
    Type: Grant
    Filed: August 31, 2010
    Date of Patent: March 25, 2014
    Assignee: Electronics & Telecommunications Research Institute
    Inventors: Doo Ho Choi, Yong-Je Choi
  • Patent number: 8615078
    Abstract: An apparatus for processing an F-function in a SEED encryption system includes: an arithmetic operation masking conversion unit for converting a logical operation mask value obtained by performing a logical operation of a SEED F-function input value and a random mask value into an arithmetic operation mask value; and a masking G-function unit for taking the arithmetic operation mask value from the arithmetic operation masking conversion unit as an input and producing an arithmetic operation output.
    Type: Grant
    Filed: May 21, 2010
    Date of Patent: December 24, 2013
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Doo Ho Choi, You Sung Kang, Ju Han Kim, Kyunghee Oh, Taesung Kim, Yong-Je Choi
  • Patent number: 8607333
    Abstract: Disclosed are a radio frequency identification (RFID) security apparatus and a method thereof. According to the RFID security method, a secure tag reader performs determining an AES key using security information received from a secure tag and generating an output key using the determined AES key, decrypting AES data received from the secure tag using the output key, and encrypting data to be transmitted to the secure tag using the output key and transmitting the data, and a secure tag performs generating an output key using an AES key and security information, and transmitting the security information to a secure tag reader, encrypting data to be transmitted to the secure tag reader using the output key, and transmitting the encrypted data to the secure tag reader, and decrypting data received from the secure tag reader using the output key.
    Type: Grant
    Filed: July 20, 2009
    Date of Patent: December 10, 2013
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Sang Yeoun Lee, Heyung Sub Lee, You Sung Kang, Doo Ho Choi, Yong-Je Choi, Hyunseok Kim, Cheol Sig Pyo, Jong-Suk Chae, Dong-Beom Shin, Jae-young Jung
  • Patent number: 8587409
    Abstract: Disclosed are a radio secure reader and a radio secure tag for supporting a secure mode and a normal mode. The radio secure reader for controlling an operation mode of the radio secure tag may include a reader modem to receive the operation mode from the radio secure tag, and a reader processing unit to identify the received operation mode as a normal mode or a secure mode, and to control the radio secure tag based on the identified operation mode.
    Type: Grant
    Filed: March 7, 2011
    Date of Patent: November 19, 2013
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Sang Yeoun Lee, Heyung Sub Lee, You Sung Kang, Kang Bok Lee, Su Na Choi, Hyun Seok Kim, Dong Beom Shin, Doo Ho Choi
  • Publication number: 20130208886
    Abstract: Disclosed herein are a method of preventing fault-injection attacks on Chinese Remainder Theorem (CRT)-Rivest Shamir Adleman (RSA) cryptographic operations, and a recording medium for storing a program implementing the same. First, the method receives first and second primes, that is, different primes, and a randomly selected prime, that is, a random prime, which are used for CRT-RSA cryptographic operations. Thereafter, a cumulative value is calculated by performing an XOR (Exclusive OR) operation on the first prime, the second prime, and the random prime using a push function. Thereafter, the first prime, the second prime, and the random prime are loaded by performing an XOR operation on the cumulative value using a pop function corresponding to the push function. Finally, CRT-RSA operations are executed by computing modulo operations based on the first prime and the second prime.
    Type: Application
    Filed: August 14, 2012
    Publication date: August 15, 2013
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Seung-Kwang LEE, Doo-Ho Choi, Hyun-Sook Cho
  • Patent number: 8488781
    Abstract: Disclosed is a method for implementing a symmetric key encryption algorithm against power analysis attacks, including: generating and storing an affine transform table; generating and storing a masked inversion table; and operating a masked S-box using the affine transform table and the masked inversion table.
    Type: Grant
    Filed: May 17, 2012
    Date of Patent: July 16, 2013
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Doo Ho Choi, Yong-Je Choi, You Sung Kang, Ju Han Kim, Tae sung Kim, Kyung hee Oh
  • Publication number: 20130003968
    Abstract: Disclosed herein are a method and apparatus for generating a session key and a cluster key using a network coding scheme. The apparatus includes a random number generation unit, a combination generation unit, a combination transmission unit, a coding result reception unit, and a restoration unit. The random number generation unit generates the random number of a node. The combination generation unit generates a combination based on a master key of the node and the random number. The combination transmission unit transfers the combination to a key distribution server. The coding result reception unit receives a result of a network coding, corresponding to an ID of the node, from the key distribution server. The restoration unit for generating a session key by restoring a random number, corresponding to a counterpart node of the node, using the result of the network coding and the random number.
    Type: Application
    Filed: June 29, 2012
    Publication date: January 3, 2013
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: You-Sung KANG, Doo-Ho Choi, Hyun-Sook Cho
  • Patent number: 8341758
    Abstract: Provided are a secure device and method for preventing a side channel attack. The secure device includes a secure module converting plaintext data received from the outside into ciphertext data to thereby store the converted ciphertext data, or converting stored ciphertext data into plaintext data to thereby output the converted plaintext data, and a side channel attack sensing module sensing a side channel attack upon the secure module, and, according to the sensing result, allowing the secure module to stop operating, inducing malfunctions of the secure module, delaying operations of the secure module, or making the secure module a device having the secure module disabled. The secure device can safely protect an internal security algorithm and data from the side channel attack.
    Type: Grant
    Filed: December 9, 2010
    Date of Patent: December 25, 2012
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Ju Han Kim, You Sung Kang, Doo Ho Choi, Yong-Je Choi
  • Patent number: 8320570
    Abstract: An apparatus for generating a secret key generates the secret key by using information of a mobile RFID terminal, transmits the generated secret key to an RFID tag attached on an article, and decrypts a unique item identifier of the article encrypted by using the generated secret key after receiving the unique item identifier of the article encrypted by using the secret key from the RFID tag. By this configuration, it is possible to protect user's personal privacy of the mobile RFID terminal in a state where user's intervention is minimized.
    Type: Grant
    Filed: December 4, 2009
    Date of Patent: November 27, 2012
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: You Sung Kang, Doo Ho Choi, Hyunsook Cho
  • Publication number: 20120294439
    Abstract: Disclosed is a method for implementing a symmetric key encryption algorithm against power analysis attacks, including: generating and storing an affine transform table; generating and storing a masked inversion table; and operating a masked S-box using the affine transform table and the masked inversion table.
    Type: Application
    Filed: May 17, 2012
    Publication date: November 22, 2012
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Doo Ho CHOI, Yong-Je Choi, You Sung Kang, Ju Han Kim, Tae sung Kim, Kyung hee Oh
  • Publication number: 20120163585
    Abstract: A masking addition operation apparatus for prevention of a side channel attack, includes a random value generation unit generating a first random value for a first input, second random value for a second input, and a summation random value. The masking addition operation apparatus includes an operation part performing an operation on the first and second random values, a previous carry input, and first and second masked random values generated based on the first and second random values. The masking addition operation apparatus includes a carry generator generating a carry input using a result of the operation part; and a summation bit generator generating a summation bit using the summation random value, the first and second random values, the previous carry input and the first and second masked random values.
    Type: Application
    Filed: December 21, 2011
    Publication date: June 28, 2012
    Applicant: Electronics and Telecommunications Research Instittute
    Inventors: Yong-Je CHOI, Doo Ho Choi, Taesung Kim, Kyunghee Oh, You Sung Kang, Ju Han Kim, Jeong Nyeo Kim, Hyun sook Cho
  • Publication number: 20120039462
    Abstract: A Revest, Shamir and Adleman (RSA) signature method includes: creating an initial hidden value using a private key and an RSA modular; converting a message to a hidden message by blinding the message using the initial hidden value and the RSA modular; obtaining a result value by performing double exponentiation on the hidden message, the initial hidden value, the RSA modular and the private key; and recovering a signature value using the result value. The RSA signature method further includes updating the initial hidden value with a new hidden value after the recovering.
    Type: Application
    Filed: August 2, 2011
    Publication date: February 16, 2012
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Doo Ho CHOI, Yong-Je CHOI
  • Publication number: 20110215908
    Abstract: Disclosed are a radio secure reader and a radio secure tag for supporting a secure mode and a normal mode. The radio secure reader for controlling an operation mode of the radio secure tag may include a reader modem to receive the operation mode from the radio secure tag, and a reader processing unit to identify the received operation mode as a normal mode or a secure mode, and to control the radio secure tag based on the identified operation mode.
    Type: Application
    Filed: March 7, 2011
    Publication date: September 8, 2011
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Sang Yeoun LEE, Heyung Sub LEE, You Sung KANG, Kang Bok LEE, Su Na CHOI, Hyun Seok KIM, Dong Beom SHIN, Doo Ho CHOI
  • Publication number: 20110176678
    Abstract: A masking operation method for a symmetric key encryption system includes, when at least two Substitution-boxes (S-boxes) are input, generating a masking S-box table for one S-box which was input; and performing an operation on one masking S-box by referring to the generated masking S-box table. Further, the masking operation method for the symmetric key encryption system includes performing an operation on a remaining masking S-box for a remaining S-box, which was input, by referring to the masking S-box table.
    Type: Application
    Filed: August 31, 2010
    Publication date: July 21, 2011
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Doo Ho CHOI, Yong-Je Choi
  • Publication number: 20110145595
    Abstract: Provided are a secure device and method for preventing a side channel attack. The secure device includes a secure module converting plaintext data received from the outside into ciphertext data to thereby store the converted ciphertext data, or converting stored ciphertext data into plaintext data to thereby output the converted plaintext data, and a side channel attack sensing module sensing a side channel attack upon the secure module, and, according to the sensing result, allowing the secure module to stop operating, inducing malfunctions of the secure module, delaying operations of the secure module, or making the secure module a device having the secure module disabled. The secure device can safely protect an internal security algorithm and data from the side channel attack.
    Type: Application
    Filed: December 9, 2010
    Publication date: June 16, 2011
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Ju Han KIM, You Sung Kang, Doo Ho Choi, Yong-Je Choi
  • Patent number: 7909259
    Abstract: Provided is an RFID tag. When no external pressure is applied to a packaging structure, a wire for transmitting power and data from an antenna is separated from an RFID chip by an air layer. When external pressure is applied to the packaging structure, the wire is connected to the RFID chip to transmit the power and data between the antenna and the RFID chip.
    Type: Grant
    Filed: August 7, 2009
    Date of Patent: March 22, 2011
    Assignee: Electronics and Telecommunication Research Institute
    Inventors: Hae Dong Lee, Doo Ho Choi, Kyo Il Chung, Hyunsook Cho
  • Publication number: 20110044450
    Abstract: An apparatus for processing an F-function in a SEED encryption system includes: an arithmetic operation masking conversion unit for converting a logical operation mask value obtained by performing a logical operation of a SEED F-function input value and a random mask value into an arithmetic operation mask value; and a masking G-function unit for taking the arithmetic operation mask value from the arithmetic operation masking conversion unit as an input and producing an arithmetic operation output.
    Type: Application
    Filed: May 21, 2010
    Publication date: February 24, 2011
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Doo Ho CHOI, You Sung Kang, Ju Han Kim, Kyunghee Oh, Taesung Kim, Yong-Je Choi
  • Patent number: 7847694
    Abstract: An electronic tag including privacy level information, and a privacy protection apparatus and method using the electronic tag are provided.
    Type: Grant
    Filed: July 10, 2006
    Date of Patent: December 7, 2010
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Byung Gil Lee, Doo Ho Choi, Ho Won Kim, Kyo Il Chung
  • Publication number: 20100277287
    Abstract: A communication data protection method based on symmetric key encryption, and an apparatus for enabling the method are provided. A communication data protection method using a Radio Frequency Identification (RFID) reader, the method including: receiving, from a tag, tag information including security parameter information and an encrypted Unique Item Identifier (UII); extracting the UII based on the security parameter information; transmitting, to the tag, a request message including a challenge value for replay prevention; and performing a tag authentication by receiving, from the tag, a response message including a handle and the challenge value.
    Type: Application
    Filed: June 17, 2008
    Publication date: November 4, 2010
    Applicant: lectronics and Telecommunications Research Institu
    Inventors: Doo Ho Choi, Yong-Je Choi, Ho Won Kim, Kyo Il Chung
  • Publication number: 20100150340
    Abstract: An exemplary embodiment of the present invention provides a method and an apparatus for minimizing a difference in data path between elliptic curve point addition and elliptic curve point doubling. An elliptic curve encryption method includes a first operation step of performing point addition for two points when two points on an elliptic curve are different from each other, and a second operation step of performing point doubling for any one point when two points on the elliptic curve are the same, wherein inverse multiplication processes and multiplication processes of the first operation step and the second operation step have the same path delay.
    Type: Application
    Filed: September 25, 2009
    Publication date: June 17, 2010
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Yong-Je CHOI, Doo Ho CHOI