Patents by Inventor Yong Je Choi
Yong Je Choi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20120294439Abstract: Disclosed is a method for implementing a symmetric key encryption algorithm against power analysis attacks, including: generating and storing an affine transform table; generating and storing a masked inversion table; and operating a masked S-box using the affine transform table and the masked inversion table.Type: ApplicationFiled: May 17, 2012Publication date: November 22, 2012Applicant: Electronics and Telecommunications Research InstituteInventors: Doo Ho CHOI, Yong-Je Choi, You Sung Kang, Ju Han Kim, Tae sung Kim, Kyung hee Oh
-
Publication number: 20120163585Abstract: A masking addition operation apparatus for prevention of a side channel attack, includes a random value generation unit generating a first random value for a first input, second random value for a second input, and a summation random value. The masking addition operation apparatus includes an operation part performing an operation on the first and second random values, a previous carry input, and first and second masked random values generated based on the first and second random values. The masking addition operation apparatus includes a carry generator generating a carry input using a result of the operation part; and a summation bit generator generating a summation bit using the summation random value, the first and second random values, the previous carry input and the first and second masked random values.Type: ApplicationFiled: December 21, 2011Publication date: June 28, 2012Applicant: Electronics and Telecommunications Research InstittuteInventors: Yong-Je CHOI, Doo Ho Choi, Taesung Kim, Kyunghee Oh, You Sung Kang, Ju Han Kim, Jeong Nyeo Kim, Hyun sook Cho
-
Publication number: 20120093308Abstract: Provided are an apparatus and method for generating random data to be used when masking data to be ciphered. The apparatus for generating random data according to an exemplary embodiment of the present invention is an apparatus for generating a random function using a physically unclonable function (PUF) logic. The apparatus for generating random data logically operates first data and second data using two different types of logic gates, and inverts the logical operation values selected from the logically operated first data and second data every odd sequence and then, inputs them as the second data again, thereby making it possible to form the output data as the random data. The present invention is applied to a data encryption apparatus for encrypting data to prevent a side channel attack.Type: ApplicationFiled: January 28, 2011Publication date: April 19, 2012Applicants: InstituteInventor: Yong Je Choi
-
Publication number: 20120039462Abstract: A Revest, Shamir and Adleman (RSA) signature method includes: creating an initial hidden value using a private key and an RSA modular; converting a message to a hidden message by blinding the message using the initial hidden value and the RSA modular; obtaining a result value by performing double exponentiation on the hidden message, the initial hidden value, the RSA modular and the private key; and recovering a signature value using the result value. The RSA signature method further includes updating the initial hidden value with a new hidden value after the recovering.Type: ApplicationFiled: August 2, 2011Publication date: February 16, 2012Applicant: Electronics and Telecommunications Research InstituteInventors: Doo Ho CHOI, Yong-Je CHOI
-
Publication number: 20110176678Abstract: A masking operation method for a symmetric key encryption system includes, when at least two Substitution-boxes (S-boxes) are input, generating a masking S-box table for one S-box which was input; and performing an operation on one masking S-box by referring to the generated masking S-box table. Further, the masking operation method for the symmetric key encryption system includes performing an operation on a remaining masking S-box for a remaining S-box, which was input, by referring to the masking S-box table.Type: ApplicationFiled: August 31, 2010Publication date: July 21, 2011Applicant: Electronics and Telecommunications Research InstituteInventors: Doo Ho CHOI, Yong-Je Choi
-
Publication number: 20110145595Abstract: Provided are a secure device and method for preventing a side channel attack. The secure device includes a secure module converting plaintext data received from the outside into ciphertext data to thereby store the converted ciphertext data, or converting stored ciphertext data into plaintext data to thereby output the converted plaintext data, and a side channel attack sensing module sensing a side channel attack upon the secure module, and, according to the sensing result, allowing the secure module to stop operating, inducing malfunctions of the secure module, delaying operations of the secure module, or making the secure module a device having the secure module disabled. The secure device can safely protect an internal security algorithm and data from the side channel attack.Type: ApplicationFiled: December 9, 2010Publication date: June 16, 2011Applicant: Electronics and Telecommunications Research InstituteInventors: Ju Han KIM, You Sung Kang, Doo Ho Choi, Yong-Je Choi
-
Publication number: 20110044450Abstract: An apparatus for processing an F-function in a SEED encryption system includes: an arithmetic operation masking conversion unit for converting a logical operation mask value obtained by performing a logical operation of a SEED F-function input value and a random mask value into an arithmetic operation mask value; and a masking G-function unit for taking the arithmetic operation mask value from the arithmetic operation masking conversion unit as an input and producing an arithmetic operation output.Type: ApplicationFiled: May 21, 2010Publication date: February 24, 2011Applicant: Electronics and Telecommunications Research InstituteInventors: Doo Ho CHOI, You Sung Kang, Ju Han Kim, Kyunghee Oh, Taesung Kim, Yong-Je Choi
-
Publication number: 20100277287Abstract: A communication data protection method based on symmetric key encryption, and an apparatus for enabling the method are provided. A communication data protection method using a Radio Frequency Identification (RFID) reader, the method including: receiving, from a tag, tag information including security parameter information and an encrypted Unique Item Identifier (UII); extracting the UII based on the security parameter information; transmitting, to the tag, a request message including a challenge value for replay prevention; and performing a tag authentication by receiving, from the tag, a response message including a handle and the challenge value.Type: ApplicationFiled: June 17, 2008Publication date: November 4, 2010Applicant: lectronics and Telecommunications Research InstituInventors: Doo Ho Choi, Yong-Je Choi, Ho Won Kim, Kyo Il Chung
-
Publication number: 20100150340Abstract: An exemplary embodiment of the present invention provides a method and an apparatus for minimizing a difference in data path between elliptic curve point addition and elliptic curve point doubling. An elliptic curve encryption method includes a first operation step of performing point addition for two points when two points on an elliptic curve are different from each other, and a second operation step of performing point doubling for any one point when two points on the elliptic curve are the same, wherein inverse multiplication processes and multiplication processes of the first operation step and the second operation step have the same path delay.Type: ApplicationFiled: September 25, 2009Publication date: June 17, 2010Applicant: Electronics and Telecommunications Research InstituteInventors: Yong-Je CHOI, Doo Ho CHOI
-
Publication number: 20100146273Abstract: Provided are a method for passive radio frequency identification (RFID) security according to a security mode. An RFID tag transmits its own current security mode to a reader and the reader drives a security protocol depending on the current security mode of the RFID tag. Also, the reader grasps the ability of the tag and then the reader drive a protocol suitable for the ability through the security mode.Type: ApplicationFiled: September 25, 2009Publication date: June 10, 2010Applicant: Electronics and Telecommunications Research InstituteInventors: You Sung KANG, Doo Ho CHOI, Yong-Je CHOI, Kyo Il CHUNG, Hyunsook CHO, Heyung Sub LEE, Sang Yeoun LEE, Kang Bok LEE, Dong-Beom SHIN, Jae-young JUNG, Cheol Sig PYO
-
RADIO FREQUENCY IDENTIFICATION (RFID) SECURITY APPARATUS HAVING SECURITY FUNCTION AND METHOD THEREOF
Publication number: 20100017617Abstract: Disclosed are a radio frequency identification (RFID) security apparatus and a method thereof. According to the RFID security method, a secure tag reader performs determining an AES key using security information received from a secure tag and generating an output key using the determined AES key, decrypting AES data received from the secure tag using the output key, and encrypting data to be transmitted to the secure tag using the output key and transmitting the data, and a secure tag performs generating an output key using an AES key and security information, and transmitting the security information to a secure tag reader, encrypting data to be transmitted to the secure tag reader using the output key, and transmitting the encrypted data to the secure tag reader, and decrypting data received from the secure tag reader using the output key.Type: ApplicationFiled: July 20, 2009Publication date: January 21, 2010Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventors: Sang Yeoun LEE, Heyung Sub Lee, You Sung Kang, Doo Ho Choi, Yong-Je Choi, Hyunseok Kim, Cheol Sig Pyo, Jong-Suk Chae, Dong-Beom Shin, Jae-young Jung -
Publication number: 20100001840Abstract: Provided are a method and a system for authenticating a radio frequency identification (RFID) tag, by which an RFID reader and an authentication server authenticate the RFID tag by using a cryptographic operation and a protocol.Type: ApplicationFiled: July 6, 2009Publication date: January 7, 2010Inventors: You Sung KANG, Yong Je CHOI, Doo Ho CHOI, Kyo Il CHUNG, Hyun Sook CHO
-
Patent number: 7599979Abstract: An apparatus and method for hybrid multiplication in GF(2m) by which trade-off between the area and the operation speed of an apparatus for a hybrid multiplier in finite field GF(2m) can be achieved are provided.Type: GrantFiled: January 28, 2005Date of Patent: October 6, 2009Assignee: Electronics and Telecommunications Research InstituteInventors: Yong Je Choi, Ku Young Chang, Do Won Hong, Hyun Sook Cho
-
Patent number: 7197141Abstract: Disclosed is an RSA cryptographic processing apparatus capable of performing the fast operating function. A modular multiplication operation or a modular exponentiation operation, i.e., an RSA cryptographic operation, is selectively performed according to a control signal inputted, the modular operation of the data of 512 to 1024 bits is iteratively performed by use of 32-bit operating unit, and the data of 512 to 1024 bits is operated by use of a 32-bit operating unit, thereby minimizing the size of the register storing the data and reducing the size of the cryptographic apparatus, and which the intermediate value generated at the operation process is stored in the internal register instead of the memory, thereby minimizing the times of access to the memory.Type: GrantFiled: December 13, 2002Date of Patent: March 27, 2007Assignee: Electronics and Telecommunications Research InstituteInventors: Moo Seop Kim, Ho Won Kim, Yong Je Choi, Young Soo Park, Kyo Il Chung, Heui Su Ryu
-
Publication number: 20040091105Abstract: In an apparatus for a hyperelliptic-curve cryptography processing, an input/output control block controls a peripheral component interconnect (PCI) interface block, a direct memory access (DMA) and a data input/output. An input memory block stores an external instruction and input data provided by the PCI interface block. An output memory block stores a final and an intermediate value of a hyperelliptic-curve cryptography operation. A MUX controls a path of input/output data. An operation core block performs a genus one elliptic-curve and a genus two hyperelliptic-curve cryptography algorithm, respectively. A controlling device controls the operation core block.Type: ApplicationFiled: March 12, 2003Publication date: May 13, 2004Inventors: Ho Won Kim, Yong-Je Choi, Moo Seop Kim, Heui Su Ryu
-
Publication number: 20030120944Abstract: Disclosed is an RSA cryptographic processing apparatus capable of performing the fast operating function. A modular multiplication operation or a modular exponentiation operation, i.e., an RSA cryptographic operation, is selectively performed according to a control signal inputted, the modular operation of the data of 512 to 1024 bits is iteratively performed by use of 32-bit operating unit, and the data of 512 to 1024 bits is operated by use of a 32-bit operating unit, thereby minimizing the size of the register storing the data and reducing the size of the cryptographic apparatus, and which the intermediate value generated at the operation process is stored in the internal register instead of the memory, thereby minimizing the times of access to the memory.Type: ApplicationFiled: December 13, 2002Publication date: June 26, 2003Inventors: Moo Seop Kim, Ho Won Kim, Yong Je Choi, Young Soo Park, Kyo Il Chung, Heui Su Ryu