• Title/Summary/Keyword: 범용

Search Result 2,873, Processing Time 0.029 seconds

High-Speed Implementations of Block Ciphers on Graphics Processing Units Using CUDA Library (GPU용 연산 라이브러리 CUDA를 이용한 블록암호 고속 구현)

  • Yeom, Yong-Jin;Cho, Yong-Kuk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.3
    • /
    • pp.23-32
    • /
    • 2008
  • The computing power of graphics processing units(GPU) has already surpassed that of CPU and the gap between their powers is getting wider. Thus, research on GPGPU which applies GPU to general purpose becomes popular and shows great success especially in the field of parallel data processing. Since the implementation of cryptographic algorithm using GPU was started by Cook et at. in 2005, improved results using graphic libraries such as OpenGL and DirectX have been published. In this paper, we present skills and results of implementing block ciphers using CUDA library announced by NVIDIA in 2007. Also, we discuss a general method converting source codes of block ciphers on CPU to those on GPU. On NVIDIA 8800GTX GPU, the resulting speeds of block cipher AES, ARIA, and DES are 4.5Gbps, 7.0Gbps, and 2.8Gbps, respectively which are faster than the those on CPU.

Object Tracking Framework of Video Surveillance System based on Non-overlapping Multi-camera (비겹침 다중 IP 카메라 기반 영상감시시스템의 객체추적 프레임워크)

  • Han, Min-Ho;Park, Su-Wan;Han, Jong-Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.141-152
    • /
    • 2011
  • Growing efforts and interests of security techniques in a diverse surveillance environment, the intelligent surveillance system, which is capable of automatically detecting and tracking target objects in multi-cameras environment, is actively developing in a security community. In this paper, we propose an effective visual surveillance system that is avaliable to track objects continuously in multiple non-overlapped cameras. The proposed object tracking scheme consists of object tracking module and tracking management module, which are based on hand-off scheme and protocol. The object tracking module, runs on IP camera, provides object tracking information generation, object tracking information distribution and similarity comparison function. On the other hand, the tracking management module, runs on video control server, provides realtime object tracking reception, object tracking information retrieval and IP camera control functions. The proposed object tracking scheme allows comprehensive framework that can be used in a diverse range of application, because it doesn't rely on the particular surveillance system or object tracking techniques.

An Improved Round Reduction Attack on Triple DES Using Fault Injection in Loop Statement (반복문 오류 주입을 이용한 개선된 Triple DES 라운드 축소 공격)

  • Choi, Doo-Sik;Oh, Doo-Hwan;Park, Jeong-Soo;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.709-717
    • /
    • 2012
  • The round reduction on block cipher is a fault injection attack in which an attacker inserts temporary errors in cryptographic devices and extracts a secret key by reducing the number of operational round. In this paper, we proposed an improved round reduction method to retrieve master keys by injecting a fault during operation of loop statement in the Triple DES. Using laser fault injection experiment, we also verified that the proposed attack could be applied to a pure microprocessor ATmega 128 chip in which the Triple DES algorithm was implemented. Compared with previous attack method which is required 9 faulty-correct cipher text pairs and some exhaustive searches, the proposed one could extract three 56-bit secret keys with just 5 faulty cipher texts.

Protection Profile for Smart Meters: Vulnerability and Security Requirements Analysis (스마트미터의 취약성/보안요구사항 분석 CC v3.1 기반 보호프로파일 개발)

  • Jung, Chul-Jo;Eun, Sun-Ki;Choi, Jin-Ho;Oh, Soo-Hyun;Kim, Hwan-Koo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.111-125
    • /
    • 2010
  • There is a growing interest in "smart grid" technology, especially after the government recently announced "low-carbon green-growth industry" project. A smart grid uses "smart meters", which can be deployed in any power-consuming places like homes and factories. It has been shown that smart meters have several security weaknesses. There is, however, no protection profile available for smart meters, which means that safety with using them is not guaranteed at all. This paper analyzes vulnerabilities of smart meters and the relevant attack methods, thereby deriving the security functions and requirements for smart meters. Finally, we propose a protection profile based on Common Criterion v3.l for smart meters.

A Round Reduction Attack on Triple DES Using Fault Injection (오류 주입을 이용한 Triple DES에 대한 라운드 축소 공격)

  • Choi, Doo-Sik;Oh, Doo-Hwan;Bae, Ki-Seok;Moon, Sang-Jae;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.91-100
    • /
    • 2011
  • The Triple Data Encryption Algorithm (Triple DES) is an international standard of block cipher, which composed of two encryption processes and one decryption process of DES to increase security level. In this paper, we proposed a Differential Fault Analysis (DFA) attack to retrieve secret keys using reduction of last round execution for each DES process in the Triple DES by fault injections. From the simulation result for the proposed attack method, we could extract three 56-bit secret keys using exhaustive search attack for $2^{24}$ candidate keys which are refined from about 9 faulty-correct cipher text pairs. Using laser fault injection experiment, we also verified that the proposed DFA attack could be applied to a pure microprocessor ATmega 128 chip in which the Triple DES algorithm was implemented.

Design and Implementation of Students Information Management System using XML (XML을 이용한 학생 정보 관리 시스템의 설계 및 구현)

  • Lee, Jae-Dong;Kim, Jae-Yoeng
    • The Journal of Korean Association of Computer Education
    • /
    • v.3 no.2
    • /
    • pp.47-57
    • /
    • 2000
  • Many people have been building HTML documents due to rapid spread and growth of web. However, HTML has limits in satisfying user's requirements, so that XML has emerged. In this paper, we design and implement student information management programs and presentation methods for maintaing the general student life archives and the analysis of results of examinations using XML and web browser. We define a XML DTD for general student life archives, and build XML documents. A private student life archive is printed from XML documents on the web using XMLDOM, DATA-BINDING, and XSL. Also, personal items and a roll book of a class can be printed and searched. In order to analyze the result of examinations we define DTD and build XML documents according to the DTD.

  • PDF

Design for Interworking with Payment System using Short-Range Wireless Communication Method (근거리 무선 통신 방식을 이용한 모바일 결제 시스템 연동에 대한 설계)

  • Lee, Ju-Sang;Lee, Hyo-Seung;Oh, Jae-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.6
    • /
    • pp.1031-1036
    • /
    • 2020
  • Untact marketing emerged as one of the top 10 marketing in 2018. Since then, the scale of the mobile payment market has expanded, and the ratio of payment through mobile is melting into life even offline. Various mobile apps such as Samsung Pay and Smart Order are already popular systems, and various other mobile payment systems are increasing. For such mobile payments, this paper aims to comprehensively design a general-purpose untouched offline payment system by designing a mobile payment system that applies a short-range wireless communication method along with a study on the currently available mobile payment-linked API. We propose an offline payment system with an untouch method to prevent the spread of infectious diseases and contribute to a healthy society by solving the problem and minimizing contact with others in the current situation like the Corona 19 Incident.

Multidrop Ethernet based IoT Architecture Design for VLBI System Control and Monitor (VLBI 시스템 제어 및 모니터를 위한 멀티드롭 이더넷 기반 IoT 아키텍처 설계)

  • Song, Min-Gyu
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.6
    • /
    • pp.1159-1168
    • /
    • 2020
  • In the past, control and monitor of a large number of instruments is a specialized area, which requires an expensive dedicated module to implement. However, with the recent development of embedded technology, various products capable of performing M&C (Monitor and Control) have been released, and the scope of application is expanding. Accordingly, it is possible to more easily build a small M&C environment than before. In this paper, we discussed a method to replace the M&C of the VLBI system, which had to be implemented through a specialized hardware product, with an inexpensive general imbeded technology. Memory based data transmission, reception and storage is a technology that is already generalized not only in VLBI but also in the network field, and more effective M&C can be implemented when some items of Ethernet are optimized for the VLBI (Very Long Baseline Interferometer) system environment. In this paper, we discuss in depth the design and implementation for the multidrop based IoT architecture.

Untact Social VR Video-based Tour Scheduling (언택트형 소셜 VR 영상기반 투어 스케줄링)

  • Yang, Seung-Hae;Lee, Duck-Hee;Kim, Hak-Chun
    • Journal of the Health Care and Life Science
    • /
    • v.8 no.2
    • /
    • pp.127-133
    • /
    • 2020
  • While only the experts could create the contents in the existing VR contents business, in the proposed "Untact Social VR Video-Based Tour Scheduling", the GUI (Graphic User Interface) allows anyone to easily and quickly share the information taken through VR camera after creating. It is intended to serve as a variety of SNS-based media by developing a structure that can be shared in html format after creating with the GUI menus. In particular, it is applied to companies that operate the SNS-type publicity projects including experience facilities and viewing facilities, and the various SNS-type publicity businesses that create the VR contents. Communication is clear compared to the existing homepage-based information delivery method, and It aims to provide universality that anyone can easily edit in an environment where only experts can edit VR video contents of.

A Research on Utilization of KDC Based on Literary Warrant (문헌적 근거에 기반한 한국십진분류법(KDC) 활용현황에 대한 연구)

  • Kim, Sungwon
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.55 no.2
    • /
    • pp.25-50
    • /
    • 2021
  • General-purpose classification scheme encompasses all subject areas, While the whole classification scheme is constructed by library studies experts, structure and preparation of each specific subject area's classification should be referenced to that specific subject. In order for the whole system to be practical and useful classification scheme, not just a simple collection of each subject area's scheme, it is necessary to set the rule for properly distributing the amount of classification items, and the collections assigned to these items. The rule to set the distribution of items based on the amount of document collections is called 'literary warrant'. This study examines actual status of assignment of each classification items to information resources, as a result of application of Korean Decimal Classification, and then suggests a way to improve these practices.