• Title/Summary/Keyword: 공개정보

Search Result 2,888, Processing Time 0.037 seconds

An Addition-Chain Heuristics and Two Modular Multiplication Algorithms for Fast Modular Exponentiation (모듈라 멱승 연산의 빠른 수행을 위한 덧셈사슬 휴리스틱과 모듈라 곱셈 알고리즘들)

  • 홍성민;오상엽;윤현수
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.2
    • /
    • pp.73-92
    • /
    • 1997
  • A modular exponentiation( E$M^{$=varepsilon$}$mod N) is one of the most important operations in Public-key cryptography. However, it takes much time because the modular exponentiation deals with very large operands as 512-bit integers. Modular exponentiation is composed of repetition of modular multiplications, and the number of repetition is the same as the length of the addition-chain of the exponent(E). Therefore, we can reduce the execution time of modular exponentiation by finding shorter addition-chain(i.e. reducing the number of repetitions) or by reducing the execution time of each modular multiplication. In this paper, we propose an addition-chain heuristics and two fast modular multiplication algorithms. Of two modular multiplication algorithms, one is for modular multiplication between different integers, and the other is for modular squaring. The proposed addition-chain heuristics finds the shortest addition-chain among exisiting algorithms. Two proposed modular multiplication algorithms require single-precision multiplications fewer than 1/2 times of those required for previous algorithms. Implementing on PC, proposed algorithms reduce execution times by 30-50% compared with the Montgomery algorithm, which is the best among previous algorithms.

Implementation of High-radix Modular Exponentiator for RSA using CRT (CRT를 이용한 하이래딕스 RSA 모듈로 멱승 처리기의 구현)

  • 이석용;김성두;정용진
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.4
    • /
    • pp.81-93
    • /
    • 2000
  • In a methodological approach to improve the processing performance of modulo exponentiation which is the primary arithmetic in RSA crypto algorithm, we present a new RSA hardware architecture based on high-radix modulo multiplication and CRT(Chinese Remainder Theorem). By implementing the modulo multiplier using radix-16 arithmetic, we reduced the number of PE(Processing Element)s by quarter comparing to the binary arithmetic scheme. This leads to having the number of clock cycles and the delay of pipelining flip-flops be reduced by quarter respectively. Because the receiver knows p and q, factors of N, it is possible to apply the CRT to the decryption process. To use CRT, we made two s/2-bit multipliers operating in parallel at decryption, which accomplished 4 times faster performance than when not using the CRT. In encryption phase, the two s/2-bit multipliers can be connected to make a s-bit linear multiplier for the s-bit arithmetic operation. We limited the encryption exponent size up to 17-bit to maintain high speed, We implemented a linear array modulo multiplier by projecting horizontally the DG of Montgomery algorithm. The H/W proposed here performs encryption with 15Mbps bit-rate and decryption with 1.22Mbps, when estimated with reference to Samsung 0.5um CMOS Standard Cell Library, which is the fastest among the publications at present.

Implementation of RSA modular exponentiator using Division Chain (나눗셈 체인을 이용한 RSA 모듈로 멱승기의 구현)

  • 김성두;정용진
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.21-34
    • /
    • 2002
  • In this paper we propos a new hardware architecture of modular exponentiation using a division chain method which has been proposed in (2). Modular exponentiation using the division chain is performed by receding an exponent E as a mixed form of multiplication and addition with divisors d=2 or $d=2^I +1$ and respective remainders r. This calculates the modular exponentiation in about $1.4log_2$E multiplications on average which is much less iterations than $2log_2$E of conventional Binary Method. We designed a linear systolic array multiplier with pipelining and used a horizontal projection on its data dependence graph. So, for k-bit key, two k-bit data frames can be inputted simultaneously and two modular multipliers, each consisting of k/2+3 PE(Processing Element)s, can operate in parallel to accomplish 100% throughput. We propose a new encoding scheme to represent divisors and remainders of the division chain to keep regularity of the data path. When it is synthesized to ASIC using Samsung 0.5 um CMOS standard cell library, the critical path delay is 4.24ns, and resulting performance is estimated to be abort 140 Kbps for a 1024-bit data frame at 200Mhz clock In decryption process, the speed can be enhanced to 560kbps by using CRT(Chinese Remainder Theorem). Futhermore, to satisfy real time requirements we can choose small public exponent E, such as 3,17 or $2^{16} +1$, in encryption and verification process. in which case the performance can reach 7.3Mbps.

Extending the OMA DRM Framework for Supporting an Active Content (능동형 콘텐츠 지원을 위한 OMA DRM 프레임워크의 확장)

  • Kim, Hoo-Jong;Jung, Eun-Su;Lim, Jae-Bong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.93-106
    • /
    • 2006
  • With the rapid growth of the wireless Internet communication, a new generation of mobile devices have made possible the broad distribution of mobile digital contents, such as image, music, video, games and applications over the wireless Internet. Mobile devices are rapidly becoming the major means to extend communication channels without copy Protection, usage rule controlling and authentication. As a result, mobile digital contents may be illegally altered, copied and distributed among unauthorized mobile devices. In this paper, we take a look at Open Mobile Alliance (OMA) DRM v2.0 in general, its purpose and function. The OMA is uniquely the focal point for development of an open standard for mobile DRM. Next we introduces features for an active content and illustrates the difference between an active content and an inactive content. Enabling fast rendering of an active content, we propose an OMA-based DRM framework. This framework include the following: 1) Extending DCF Header for supporting an selective encryption, 2) Content encryption key management, 3) Rendering API for an active content. Experimental results show that the proposed framework is able to render an active content fast enough to satisfy Quality of Experience. %is framework has been proposed for a mobile device environment, but it is also applicable to other devices, such as portable media players, set-top boxes, or personal computer.

A Study on National Cyber Capability Assessment Methodology (국가 사이버 역량 평가 방법론 연구)

  • Kang, JungMin;Hwang, HyunUk;Lee, JongMoon;Yun, YoungTae;Bae, ByungChul;Jung, SoonYoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1039-1055
    • /
    • 2012
  • It is required for us to enhance the national cyber capability as the worldwide countries have been doing effort to strengthen their cyber capabilities. However, we are encountering the difficulty in estimating national cyber capability due to the absence of any cyber capability assessment methodology. This paper presents the national cyber capability assessment methodology which is used for settle up national cyber policy. We also introduce the result of five major nations(US, China, Japan, Russia, Korea)' cyber capability assessment using the proposed methodology. The methodology is developed using open data and includes three areas; base capability, attack capability and defense capability. The assessment result shows the in the order of US, China, Korea, Russia, Japan. As the analysis of that result, in order to enhance the our cyber capability, we recommend that first, cyber budget and human resources for the base capability should be more invested, second, the strategy for attack capability enhancement is strongly required and lastly, the patch ratio and security monitoring level should be upgraded.

Analysis on the Status of Joint Forestry Project in National Forest (국유림 공동산림사업 실태분석에 관한 연구)

  • Kim, Dong-Hyeon;Ko, Chi-Ung;Kim, Dong-Geun
    • Journal of agriculture & life science
    • /
    • v.53 no.6
    • /
    • pp.45-53
    • /
    • 2019
  • The purpose of this study is to analyze the status of the joint forest project, which is one of the national forest management system, by using stakeholder participation, transparency of decision making, accountability of actors and stakeholders, The questionnaire survey was conducted using the 5 - point scale and the written form. As a result of the questionnaire survey, various stakeholder participation items had the highest opportunity to participate with an average of 3.3 and the lowest score with 2.3 points for establishing conflict and conflict resolution structures. Transparency was analyzed to be 3.4 points for the project disclosure, 2.7 points for information sharing and education promotion activities for local residents, 3.3 points for the detailed role of the project implementer, and 2.7 points for internal and external monitoring and evaluation of the project with various stakeholders. The results of this research, analyzed through the participatory forest management index, are deemed to be used as basic data for the establishment of a plan for the revitalization of national forest participation management.

Human Skeleton Keypoints based Fall Detection using GRU (PoseNet과 GRU를 이용한 Skeleton Keypoints 기반 낙상 감지)

  • Kang, Yoon Kyu;Kang, Hee Yong;Weon, Dal Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.127-133
    • /
    • 2021
  • A recent study of people physically falling focused on analyzing the motions of the falls using a recurrent neural network (RNN) and a deep learning approach to get good results from detecting 2D human poses from a single color image. In this paper, we investigate a detection method for estimating the position of the head and shoulder keypoints and the acceleration of positional change using the skeletal keypoints information extracted using PoseNet from an image obtained with a low-cost 2D RGB camera, increasing the accuracy of judgments about the falls. In particular, we propose a fall detection method based on the characteristics of post-fall posture in the fall motion-analysis method. A public data set was used to extract human skeletal features, and as a result of an experiment to find a feature extraction method that can achieve high classification accuracy, the proposed method showed a 99.8% success rate in detecting falls more effectively than a conventional, primitive skeletal data-use method.

Sun-induced Fluorescence Data: Case of the Rice Paddy Field in Naju (논벼에서 관측된 태양 유도 엽록소 형광 자료: 나주에서 2020년 6월 10일부터 10월 5일까지)

  • Ryu, Jae-Hyun;Jang, Seon Woong;Kim, Hyunki;Moon, Hyun-Dong;Sin, Seo-Ho;Lee, Yang-Won;Cho, Jaeil
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.23 no.1
    • /
    • pp.82-88
    • /
    • 2021
  • Sun-induced fluorescence (SIF) retrieval using remote sensing technique has been used in an effort to understand the photosynthetic efficiency and stress condition of vegetation. Although optical devices and SIF retrieval methodologies were established in order to retrieve SIF, the SIF measurements are domestically sparse. SIF data of paddy rice w as measured in Naju, South Korea from June 10, 2020 to October 5, 2020. The SIFs based red (O2A) and far-red (O2B) w ere retrieved using a spectral fitting method and an improved Fraunhofer line depth, and photosynthetically active radiation was also produced. In addition, the SIF data was filtered considering solar zenith angle, saturation conditions, the rapid and sudden change of solar irradiance, and sun glint. The provided SIF data can help to understand a SIF product and the filtering method of SIF data can contribute to producing high-quality SIF data.

The Education Model of Liberal Arts to Improve the Artificial Intelligence Literacy Competency of Undergraduate Students (대학생의 AI 리터러시 역량 신장을 위한 교양 교육 모델)

  • Park, Youn-Soo;Yi, Yumi
    • Journal of The Korean Association of Information Education
    • /
    • v.25 no.2
    • /
    • pp.423-436
    • /
    • 2021
  • In the future, artificial intelligence (AI) technology is expected to become a general-purpose technology (GPT), and it is predicted that AI competency will become an essential competency. Several nations around the world are fostering experts in the field of AI to achieve technological proficiency while working to develop the necessary infrastructure and educational environment. In this study, we investigated the status of software education at the liberal arts level at 31 universities in Seoul, along with precedents from domestic and foreign AI education research. Based on this, we concluded that an AI literacy education model is needed to link software education at the liberal arts level with professional AI education. And we classified 20 AI-related lectures released in the KOCW according to the AI literacy competencies required; based on the results of this classification, we propose a model for AI literacy education in the liberal arts for undergraduate students. The proposed AI literacy education model may be considered as AI·SW convergence to experience AI along with literacy in the humanities, deviating from the existing theoretical and computer-science-based approach. We expect that our proposed AI literacy education model can contribute to the proliferation of AI.

Development of a Software for Re-Entry Prediction of Space Objects for Space Situational Awareness (우주상황인식을 위한 인공우주물체 추락 예측 소프트웨어 개발)

  • Choi, Eun-Jung
    • Journal of Space Technology and Applications
    • /
    • v.1 no.1
    • /
    • pp.23-32
    • /
    • 2021
  • The high-level Space Situational Awareness (SSA) objective is to provide to the users dependable, accurate and timely information in order to support risk management on orbit and during re-entry and support safe and secure operation of space assets and related services. Therefore the risk assessment for the re-entry of space objects should be managed nationally. In this research, the Software for Re-Entry Prediction of space objects (SREP) was developed for national SSA system. In particular, the rate of change of the drag coefficient is estimated through a newly proposed Drag Scale Factor Estimation (DSFE), and is used for high-precision orbit propagator (HPOP) up to an altitude of 100 km to predict the re-entry time and position of the space object. The effectiveness of this re-entry prediction is shown through the re-entry time window and ground track of space objects falling in real events, Grace-1, Grace-2, Tiangong-1, and Chang Zheng-5B Rocket body. As a result, through analysis 12 hours before the final re-entry time, it is shown that the re-entry time window and crash time can be accurately predicted with an error of less than 20 minutes.