• Title/Summary/Keyword: 조합논리

Search Result 162, Processing Time 0.024 seconds

Design of Advanced Multiplicative Inverse Operation Circuit for AES Encryption (AES 암호화를 위한 개선된 곱셈 역원 연산기 설계)

  • Kim, Jong-Won;Kang, Min-Sup
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.4
    • /
    • pp.1-6
    • /
    • 2020
  • This paper proposes the design of an advanced S-Box for calculating multiplicative inverse in AES encryption process. In this approach, advanced S-box module is first designed based on composite field, and then the performance evaluation is performed for S-box with multi-stage pipelining architecture. In the proposed S-Box architecture, each module for multiplicative inverse is constructed using combinational logic for realizing both small-area and high-speed. Through logic synthesis result, the designed 3-stage pipelined S-Box shows speed improvement of about 28% compared to the conventional method. The proposed advanced AES S-Box is performed modelling at the mixed level using Verilog-HDL, and logic synthesis is also performed on Spartan 3s1500l FPGA using Xilinx ISE 14.7 tool.

DPA-Resistant Logic Gates and Secure Designs of SEED and SHA-1 (차분 전력분석 공격에 안전한 논리 게이트 및 SEED 블록 암호 알고리즘과 SHA-1 해쉬 함수에의 응용)

  • Baek, Yoo-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.17-25
    • /
    • 2008
  • The differential power attack (DPA)[8] is a very powerful side-channel attack tool against various cryptosystems and the masking method[10] is known to be one of its algorithmic countermeasures. But it is non-trivial to apply the masking method to non-linear functions, especially, to arithmetic adders. This paper proposes simple and efficient masking methods applicable to arithmetic adders. For this purpose, we use the fact that every combinational logic circuit (including the adders) can be decomposed into basic logic gates (AND, OR, NAND, NOR, XOR, XNOR, NOT) and try to devise efficient masking circuits for these basic gates. The resulting circuits are then applied to the arithmetic adders to get their masking algorithm. As applications, we applied the proposed masking methods to SEED and SHA-1 in hardware.

Secure Component Composition for Practical Systems (실용적인 시스템을 위한 안전한 소프트웨어 컴포넌트 조합)

  • Lee Eun-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.43-57
    • /
    • 2006
  • When building a software system out of software components, the composition is not simple because of the complexity caused by diverse versions, digital signatures, static type information, and off-the-shelf components from various vendors. Well-established linking policies are one of the best solutions to solve the complexity problem at linking time. Secure Linking (SL) enables users to specify their linking policies which can be enforced at link time. Secure Linking framework is a framework based on a higher-order logic in order to help build a SL system. This paper shows that the Secure Linking logic is expressive enough to describe a real-world component composition system, the linking protocol of.NET. The paper also demonstrates the advantage of the logic-based linking framework by discussing the weakness of the code signing protocol in.NET which was found while we encoded the assembly linking system of.NET.

An Analysis of Mathematical Thinking and Strategies Appeared in Solving Mathematical Puzzles (수학퍼즐 해결과정에서 나타나는 수학적 사고와 전략)

  • Kim, Pansoo
    • Journal of Creative Information Culture
    • /
    • v.5 no.3
    • /
    • pp.295-306
    • /
    • 2019
  • Despite the popularity and convenient accessibility of puzzles, the variety of puzzles have led to a lack of research on the nature of the puzzle itself. In guiding certain skills, such as abstractness, creativity, and logic, a teacher should have the thinking skill and strategy that appear in solving puzzles. In this study, the mathematical thinking that appears in solving puzzles from the perspective of experts is identified, and the strategies and characteristics are described and classified accordingly. For this purpose, we analyzed 85 math puzzles including the well-know puzzles to the public, plus puzzles from a popular book for the gifted student. The research analysis shows that there are 6 types of mathematics puzzles in which require mathematical thinking.

Amethod for the Display of Hangout in its traditional Combined Form (한글문자 모아쓰기 Display의 한방안)

  • 안수길
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.12 no.1
    • /
    • pp.27-33
    • /
    • 1975
  • The required minimum size of character diode matrix of Korean letters is estimated from the topological complexity of letter structure. The OR aombination of three letter boards (diode matrice) gives all possible Hangout whole letters in proper traditional combined form with minimum required discernibility. Two forms of first consonants (centre located ones for horizontal vowels and leftward displaced ones for vertical and composed vowels) are switched by only 1 bit of the vowel code. The vowel pattern length is modified by again the last four bits of the code. A new 15bit sized inner code is proposed which permits considerably small sized decoding mechanism.

  • PDF

Reading Children's Mind from Digital Drawings based on Dominant Color Analysis using ART2 Clustering and Fuzzy Logic (ART2 군집화와 퍼지 논리를 이용한 디지털 그림의 색채 주조색 분석에 의한 아동 심리 분석)

  • Kim, Kwang-baek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1203-1208
    • /
    • 2016
  • For young children who are not spontaneous or not accurate in verbal communication of their emotions and experiences, drawing is a good means of expressing their status in mind and thus drawing analysis with chromatics is a traditional tool for art therapy. Recently, children enjoy digital drawing via painting tools thus there is a growing needs to develop an automatic digital drawing analysis tool based on chromatics and art therapy theory. In this paper, we propose such an analyzing tool based on dominant color analysis. Technically, we use ART2 clustering and fuzzy logic to understand the fuzziness of subjects' status of mind expressed in their digital drawings. The frequency of color usage is fuzzified with respect to the membership functions. After applying fuzzy logic to this fuzzified central vector, we determine the dominant color and supporting colors from the digital drawings and children's status of mind is then analyzed according to the color-personality relationships based on Alschuler and Hattwick's historical researches.

Brainwave Activities of the Cognitive Individual Differences in Computerized Arithmetic Addition by Implicit Association Test (컴퓨터 덧셈학습의 인지적 개인차에 대한 암묵적 연합검사를 적용한 뇌파 분석)

  • Kwon, Hyung-Kyu
    • Journal of The Korean Association of Information Education
    • /
    • v.15 no.4
    • /
    • pp.635-644
    • /
    • 2011
  • This research analyzed the brainwave activities and brain hemispherity to find out any implications to design the connections between the activities of the brain function and the computerized arithmetic addition in two difficulty levels: easy: 1-5 vs. hard: 6-9. Thus, in developing the brain based math learning for the computer education by implicit association test(IAT) indicated the significant results for the exclusive brain location and the brain hemispherity on the theta, alpha, low alpha, beta brainwaves by QEEG analysis. The results of this study physiologically supported the theoretical background for the computerized math learning skills as well as the math learning material development. It shows the difficulty levels of math information education and the brain activities on cognitive process of the learner continued on the possible investigation of the brain science.

  • PDF

An Implementation of the Embedded Linux System on the Wireless Network using Ad hoc PCMCIA Interface (Ad hoc 방식의 PCMCIA 접속에 의한 리눅스 기반의 무선 네트워크 시스템 구현)

  • Kim, Sung-Ho;Moon, Ho-Sun;Kim, Yong-Deak
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.4 s.316
    • /
    • pp.1-9
    • /
    • 2007
  • An embedded system is implemented in this work by removing PCMCIA dedicate controller chip from ARM processor based embedded Linux system. In this paper, we propose PCMCIA interface architecture by using Ad hoc methods for wireless network. The proposed system is developed based on S3C2410A processor and it is interfaced with PCMCIA socket by using combinational digital logic circuits. It is interesting to observe that Ad hoc interface provides $97.9%{\sim}102.49%$ performance when compared with dedicate controller systems. The results indicate that the proposed method simplifies the system without loss of performance.

Simulation Analysis to Optimize the Management of Military Maintenance Facility (군 정비시설 운용 최적화를 위한 시뮬레이션 분석 연구)

  • Kim, Kyung-Rok;Rhee, Jong-Moon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.5
    • /
    • pp.2724-2731
    • /
    • 2014
  • As the future national defense plan of government focus on advanced weapon system, military maintenance facility becomes more important. However, military maintenance facility has been managed by director's experience and simple mathematical calculation until now. Thus, the optimization for the management of military maintenance facility is suggested by more scientistic and logical methods in this study. The study follows the procedure below. First, simulation is designed according to the analysis of military maintenance facility. Second, independent variable and dependent variable are defined for optimization. Independent Variable includes the number of maintenance machine, transportation machine, worker in the details of military maintenance facility operation, and dependent variable involves total maintenance time affected by independent variable. Third, warmup analysis is performed to get warmup period, based on the simulation model. Fourth, the optimal combination is computed with evolution strategy, meta-heuristic, to enhance military maintenance management. By the optimal combination, the management of military maintenance facility can gain the biggest effect against the limited cost. In the future, the multipurpose study, to analyze the military maintenance facility covering various weapon system equipments, will be performed.

The Formation Process of Scientific Knowledge for Pre-service Science Teachers through Collective Intelligence (집단지성을 활용한 예비교사들의 과학지식 형성과정 탐색)

  • Kim, Semi;Kim, Eunjin;Kim, Sung-Won
    • Journal of The Korean Association For Science Education
    • /
    • v.33 no.5
    • /
    • pp.963-980
    • /
    • 2013
  • The purpose of this study was to investigate the process of constructing pre-service teachers' scientific knowledge information through collective intelligence. We selected the 'Appropriate Technology' (A.T.) as the subject for formation of scientific knowledge. Twenty nine pre-service teachers of the course 'Scientific Thinking and Writing in Science Education' were allowed to freely post information whenever they wanted. They presented their full opinions, interacted with each other, and assessed the other' information on the website for a month. The way of posting was as follows. After one pre-service teacher had written the information about A.T. on the website, the other assessed the text and added or modified the writing. This process continued. We analyzed every writing they posted and questionnaire which contained the reason why they modified the text. The result was as follows. Pre-service teachers formed collective intelligence through four stages. First, pre-service teachers started to find the information related to the subject and they just added the information behind the other's writing. In the second stage, information was added, too. But the difference was that the information they selected carried values for having certain views. Third, they organized their writings with logical and critical thinking. Finally, they revised their overall writing. The results showed that students could develop their critical thinking and they could learn the way of communication from the process of collective intelligence. We found the forming process of knowledge by collective intelligence, and explored the various involving patterns and thinking activities in the process. Based on this research, we expect the improvement of students' logical and critical thinking through the various classes using collective intelligence.