Patents by Inventor Yong Je Choi

Yong Je Choi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20120294439
    Abstract: Disclosed is a method for implementing a symmetric key encryption algorithm against power analysis attacks, including: generating and storing an affine transform table; generating and storing a masked inversion table; and operating a masked S-box using the affine transform table and the masked inversion table.
    Type: Application
    Filed: May 17, 2012
    Publication date: November 22, 2012
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Doo Ho CHOI, Yong-Je Choi, You Sung Kang, Ju Han Kim, Tae sung Kim, Kyung hee Oh
  • Publication number: 20120163585
    Abstract: A masking addition operation apparatus for prevention of a side channel attack, includes a random value generation unit generating a first random value for a first input, second random value for a second input, and a summation random value. The masking addition operation apparatus includes an operation part performing an operation on the first and second random values, a previous carry input, and first and second masked random values generated based on the first and second random values. The masking addition operation apparatus includes a carry generator generating a carry input using a result of the operation part; and a summation bit generator generating a summation bit using the summation random value, the first and second random values, the previous carry input and the first and second masked random values.
    Type: Application
    Filed: December 21, 2011
    Publication date: June 28, 2012
    Applicant: Electronics and Telecommunications Research Instittute
    Inventors: Yong-Je CHOI, Doo Ho Choi, Taesung Kim, Kyunghee Oh, You Sung Kang, Ju Han Kim, Jeong Nyeo Kim, Hyun sook Cho
  • Publication number: 20120093308
    Abstract: Provided are an apparatus and method for generating random data to be used when masking data to be ciphered. The apparatus for generating random data according to an exemplary embodiment of the present invention is an apparatus for generating a random function using a physically unclonable function (PUF) logic. The apparatus for generating random data logically operates first data and second data using two different types of logic gates, and inverts the logical operation values selected from the logically operated first data and second data every odd sequence and then, inputs them as the second data again, thereby making it possible to form the output data as the random data. The present invention is applied to a data encryption apparatus for encrypting data to prevent a side channel attack.
    Type: Application
    Filed: January 28, 2011
    Publication date: April 19, 2012
    Applicants: Institute
    Inventor: Yong Je Choi
  • Publication number: 20120039462
    Abstract: A Revest, Shamir and Adleman (RSA) signature method includes: creating an initial hidden value using a private key and an RSA modular; converting a message to a hidden message by blinding the message using the initial hidden value and the RSA modular; obtaining a result value by performing double exponentiation on the hidden message, the initial hidden value, the RSA modular and the private key; and recovering a signature value using the result value. The RSA signature method further includes updating the initial hidden value with a new hidden value after the recovering.
    Type: Application
    Filed: August 2, 2011
    Publication date: February 16, 2012
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Doo Ho CHOI, Yong-Je CHOI
  • Publication number: 20110176678
    Abstract: A masking operation method for a symmetric key encryption system includes, when at least two Substitution-boxes (S-boxes) are input, generating a masking S-box table for one S-box which was input; and performing an operation on one masking S-box by referring to the generated masking S-box table. Further, the masking operation method for the symmetric key encryption system includes performing an operation on a remaining masking S-box for a remaining S-box, which was input, by referring to the masking S-box table.
    Type: Application
    Filed: August 31, 2010
    Publication date: July 21, 2011
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Doo Ho CHOI, Yong-Je Choi
  • Publication number: 20110145595
    Abstract: Provided are a secure device and method for preventing a side channel attack. The secure device includes a secure module converting plaintext data received from the outside into ciphertext data to thereby store the converted ciphertext data, or converting stored ciphertext data into plaintext data to thereby output the converted plaintext data, and a side channel attack sensing module sensing a side channel attack upon the secure module, and, according to the sensing result, allowing the secure module to stop operating, inducing malfunctions of the secure module, delaying operations of the secure module, or making the secure module a device having the secure module disabled. The secure device can safely protect an internal security algorithm and data from the side channel attack.
    Type: Application
    Filed: December 9, 2010
    Publication date: June 16, 2011
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Ju Han KIM, You Sung Kang, Doo Ho Choi, Yong-Je Choi
  • Publication number: 20110044450
    Abstract: An apparatus for processing an F-function in a SEED encryption system includes: an arithmetic operation masking conversion unit for converting a logical operation mask value obtained by performing a logical operation of a SEED F-function input value and a random mask value into an arithmetic operation mask value; and a masking G-function unit for taking the arithmetic operation mask value from the arithmetic operation masking conversion unit as an input and producing an arithmetic operation output.
    Type: Application
    Filed: May 21, 2010
    Publication date: February 24, 2011
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Doo Ho CHOI, You Sung Kang, Ju Han Kim, Kyunghee Oh, Taesung Kim, Yong-Je Choi
  • Publication number: 20100277287
    Abstract: A communication data protection method based on symmetric key encryption, and an apparatus for enabling the method are provided. A communication data protection method using a Radio Frequency Identification (RFID) reader, the method including: receiving, from a tag, tag information including security parameter information and an encrypted Unique Item Identifier (UII); extracting the UII based on the security parameter information; transmitting, to the tag, a request message including a challenge value for replay prevention; and performing a tag authentication by receiving, from the tag, a response message including a handle and the challenge value.
    Type: Application
    Filed: June 17, 2008
    Publication date: November 4, 2010
    Applicant: lectronics and Telecommunications Research Institu
    Inventors: Doo Ho Choi, Yong-Je Choi, Ho Won Kim, Kyo Il Chung
  • Publication number: 20100150340
    Abstract: An exemplary embodiment of the present invention provides a method and an apparatus for minimizing a difference in data path between elliptic curve point addition and elliptic curve point doubling. An elliptic curve encryption method includes a first operation step of performing point addition for two points when two points on an elliptic curve are different from each other, and a second operation step of performing point doubling for any one point when two points on the elliptic curve are the same, wherein inverse multiplication processes and multiplication processes of the first operation step and the second operation step have the same path delay.
    Type: Application
    Filed: September 25, 2009
    Publication date: June 17, 2010
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Yong-Je CHOI, Doo Ho CHOI
  • Publication number: 20100146273
    Abstract: Provided are a method for passive radio frequency identification (RFID) security according to a security mode. An RFID tag transmits its own current security mode to a reader and the reader drives a security protocol depending on the current security mode of the RFID tag. Also, the reader grasps the ability of the tag and then the reader drive a protocol suitable for the ability through the security mode.
    Type: Application
    Filed: September 25, 2009
    Publication date: June 10, 2010
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: You Sung KANG, Doo Ho CHOI, Yong-Je CHOI, Kyo Il CHUNG, Hyunsook CHO, Heyung Sub LEE, Sang Yeoun LEE, Kang Bok LEE, Dong-Beom SHIN, Jae-young JUNG, Cheol Sig PYO
  • Publication number: 20100017617
    Abstract: Disclosed are a radio frequency identification (RFID) security apparatus and a method thereof. According to the RFID security method, a secure tag reader performs determining an AES key using security information received from a secure tag and generating an output key using the determined AES key, decrypting AES data received from the secure tag using the output key, and encrypting data to be transmitted to the secure tag using the output key and transmitting the data, and a secure tag performs generating an output key using an AES key and security information, and transmitting the security information to a secure tag reader, encrypting data to be transmitted to the secure tag reader using the output key, and transmitting the encrypted data to the secure tag reader, and decrypting data received from the secure tag reader using the output key.
    Type: Application
    Filed: July 20, 2009
    Publication date: January 21, 2010
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Sang Yeoun LEE, Heyung Sub Lee, You Sung Kang, Doo Ho Choi, Yong-Je Choi, Hyunseok Kim, Cheol Sig Pyo, Jong-Suk Chae, Dong-Beom Shin, Jae-young Jung
  • Publication number: 20100001840
    Abstract: Provided are a method and a system for authenticating a radio frequency identification (RFID) tag, by which an RFID reader and an authentication server authenticate the RFID tag by using a cryptographic operation and a protocol.
    Type: Application
    Filed: July 6, 2009
    Publication date: January 7, 2010
    Inventors: You Sung KANG, Yong Je CHOI, Doo Ho CHOI, Kyo Il CHUNG, Hyun Sook CHO
  • Patent number: 7599979
    Abstract: An apparatus and method for hybrid multiplication in GF(2m) by which trade-off between the area and the operation speed of an apparatus for a hybrid multiplier in finite field GF(2m) can be achieved are provided.
    Type: Grant
    Filed: January 28, 2005
    Date of Patent: October 6, 2009
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Yong Je Choi, Ku Young Chang, Do Won Hong, Hyun Sook Cho
  • Patent number: 7197141
    Abstract: Disclosed is an RSA cryptographic processing apparatus capable of performing the fast operating function. A modular multiplication operation or a modular exponentiation operation, i.e., an RSA cryptographic operation, is selectively performed according to a control signal inputted, the modular operation of the data of 512 to 1024 bits is iteratively performed by use of 32-bit operating unit, and the data of 512 to 1024 bits is operated by use of a 32-bit operating unit, thereby minimizing the size of the register storing the data and reducing the size of the cryptographic apparatus, and which the intermediate value generated at the operation process is stored in the internal register instead of the memory, thereby minimizing the times of access to the memory.
    Type: Grant
    Filed: December 13, 2002
    Date of Patent: March 27, 2007
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Moo Seop Kim, Ho Won Kim, Yong Je Choi, Young Soo Park, Kyo Il Chung, Heui Su Ryu
  • Publication number: 20040091105
    Abstract: In an apparatus for a hyperelliptic-curve cryptography processing, an input/output control block controls a peripheral component interconnect (PCI) interface block, a direct memory access (DMA) and a data input/output. An input memory block stores an external instruction and input data provided by the PCI interface block. An output memory block stores a final and an intermediate value of a hyperelliptic-curve cryptography operation. A MUX controls a path of input/output data. An operation core block performs a genus one elliptic-curve and a genus two hyperelliptic-curve cryptography algorithm, respectively. A controlling device controls the operation core block.
    Type: Application
    Filed: March 12, 2003
    Publication date: May 13, 2004
    Inventors: Ho Won Kim, Yong-Je Choi, Moo Seop Kim, Heui Su Ryu
  • Publication number: 20030120944
    Abstract: Disclosed is an RSA cryptographic processing apparatus capable of performing the fast operating function. A modular multiplication operation or a modular exponentiation operation, i.e., an RSA cryptographic operation, is selectively performed according to a control signal inputted, the modular operation of the data of 512 to 1024 bits is iteratively performed by use of 32-bit operating unit, and the data of 512 to 1024 bits is operated by use of a 32-bit operating unit, thereby minimizing the size of the register storing the data and reducing the size of the cryptographic apparatus, and which the intermediate value generated at the operation process is stored in the internal register instead of the memory, thereby minimizing the times of access to the memory.
    Type: Application
    Filed: December 13, 2002
    Publication date: June 26, 2003
    Inventors: Moo Seop Kim, Ho Won Kim, Yong Je Choi, Young Soo Park, Kyo Il Chung, Heui Su Ryu