• Title/Summary/Keyword: 패턴 널

Search Result 60, Processing Time 0.027 seconds

Improved SITM Attack on the PRESENT Blockcipher (블록암호 PRESENT에 대한 향상된 SITM 공격)

  • Park, Jonghyun;Kim, Hangi;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.155-162
    • /
    • 2022
  • The SITM (See-In-The-Middle) attack proposed in CHES 2020 is a type of analysis technique that combines differential cryptanalysis and side-channel analysis, and can be applied even in a harsh environment with a low SNR (Signal-to-Noise Ratio). This attack targets partial 1st or higher order masked block cipher, and uses unmasked middle round weakness. PRESENT is a lightweight blockcipher proposed in CHES 2007, designed to be implemented efficiently in a low-power environment. In this paper, we propose SITM attacks on 14-round masked implementation of PRESENT while the previous attacks were applicable to 4-round masked implementation of PRESENT. This indicates that PRESENT has to be implemented with more than 16-round masking to be resistant to our attacks.

SITM Attacks on Skinny-128-384 and Romulus-N (Skinny-128-384와 Romulus-N의 SITM 공격)

  • Park, Jonghyun;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.807-816
    • /
    • 2022
  • See-In-The-Middle (SITM) is an analysis technique that uses Side-Channel information for differential cryptanalysis. This attack collects unmasked middle-round power traces when implementing block ciphers to select plaintext pairs that satisfy the attacker's differential pattern and utilize them for differential cryptanalysis to recover the key. Romulus, one of the final candidates for the NIST Lightweight Cryptography standardization competition, is based on Tweakable block cipher Skinny-128-384+. In this paper, the SITM attack is applied to Skinny-128-384 implemented with 14-round partial masking. This attack not only increased depth by one round, but also significantly reduced the time/data complexity to 214.93/214.93. Depth refers to the round position of the block cipher that collects the power trace, and it is possible to measure the appropriate number of masking rounds required when applying the masking technique to counter this attack. Furthermore, we extend the attack to Romulus's Nonce-based AE mode Romulus-N, and Tweakey's structural features show that it can attack with less complexity than Skinny-128-384.

Design and Implementation of the Survival Game API Using Dependency Injection (의존성 주입을 활용한 서바이벌 게임 API 설계 및 구현)

  • InKyu Park;GyooSeok Choi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.4
    • /
    • pp.183-188
    • /
    • 2023
  • Game object inheritance and multiple components allow for visualization of system architecture, good code reuse, and fast prototyping. On the other hand, objects are more likely to rely on high latency between game objects and components, static casts, and lots of references to things like null pointers. Therefore, It is important to design a game in such a way so that the dependency of objects on multiple classes could be reduced and existing codes could be reused. Therefore, we designed the game to make the classes more modular by applying Dependency Injection and the design patterns proposed by the Gang of Four. Since these dependencies are attributes of the game object and the injection occurs only in the initialization pass, there is little performance degradation or performance penalty in the game loop. Therefore, this paper proposed an efficient design method to effectively reuse APIs in the design and implementation of survival games.

A Study on Design Optimization for Anti-Jamming GPS Antenna (항 재밍 GPS 안테나 설계 최적화에 관한 연구)

  • Jung, Jin-Woo;Kim, Kyoung-Keun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.2
    • /
    • pp.245-254
    • /
    • 2022
  • In this paper, a design optimization method for anti-jamming GPS antenna is presented. For this purpose, jamming performance analysis criteria and methods are presented. And based on the proposed analysis method, the antenna design elements that can realize the best performance were optimized. The anti-jamming GPS antenna for applying the presented method has a structure in which 7 radiating elements are arranged. Here, six radiating elements were circular arranged, and one element was arranged in the center of the circular arrangement. The optimized antenna design parameter(radius of the circular array) is 0.48 λ. As a result of the simulation, it was confirmed that when the steering angle(theta, phi) of the main lobe was (0°, 0°), the pattern null steering range(based on theta) was 57° to 90°.

A Study on UAV Tracking Method with Anti-Jamming Function for Forest Resource Management (산림자원 관리를 위한 항 재밍 기능을 보유한 무인항공기국 추적방법에 관한 연구)

  • Jin-Woo Jung;Yong-Gyu Shin
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.6
    • /
    • pp.1245-1258
    • /
    • 2023
  • To efficiently manage forest resources, it is essential to deploy multiple unmanned aerial vehicles equipped with various sensors simultaneously. Consequently, the ground control station antenna should not only maintain continuous tracking of the target station but also minimize the impact of radio interference on other unmanned aerial vehicle stations. In this paper, we presented beam forming techniques based on the VPR algorithm within a ground control station constructed using a phased array antenna system. Through simulation experiments in diverse unmanned aerial vehicle operating environments, it was demonstrated that the presented method enables not only the continuous tracking of operational unmanned aerial vehicles but also the suppression of radio interference by establishing a continuous pattern null for multiple operational radio interference sources.

Seasonal Onset and Duration in South Korea (우리나라 사계절 개시일과 지속기간)

  • Choi, Gwang-Yong;Kwon, Won-Tae;Robinson David A.
    • Journal of the Korean Geographical Society
    • /
    • v.41 no.4 s.115
    • /
    • pp.435-456
    • /
    • 2006
  • This study examines the long-term spatial patterns and recent trends of seasonal onsets and durations defined by daily temperatures in South Korea for the period 1973-2004. Spatially, spring and winter onset dates show approximately 44 day and 63 day maximum difference respectively between south and north (Seongsanpo to Daegwallryeong) attributable to the impacts of latitudes and altitudes. In contrast, summer onset, which is more affected by proximity to oceans and altitudes than by latitudes, begins earlier in interior low elevated areas than in the coastal areas but earliest at higher latitudes than Jeiu Island. Five climatic types regarding the seasonal cycles in South Korea are spatially clustered according to the combination of longer seasonal durations. As a reflection of recent climate changes on seasonal cycles in South Korea, winter duration was shortened by 10 days during the post-1988 period due to a late winter onset of 4 days and an early spring onset of 6 days. The winter reduction began in the southern regions of the Korean Peninsula in the mid-1980s and spread northward during the 1990s period, ultimately appearing everywhere. In urbanized cities, where much of the surface is covered with asphalt or concrete, the winter reduction was intensified and summer duration was locally incremented. The reduced winter duration in recent decades shows significant teleconnections with variations of geopotential height (925hPa) in the eastern Arctic region ($0-90^{\circ}E$, $65-85^{\circ}N$) during the cold season. The reduction in winter duration in South Korea agrees with results in overall global warming trends as a climate change signal.

Study for improving attack Complexity against RSA Collision Analysis (RSA 충돌 분석 공격 복잡도 향상을 위한 연구)

  • Sim, Bo-Youn;Won, Yoo-Seung;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.261-270
    • /
    • 2015
  • In information security devices, such as Smart Cards, vulnerabilities of the RSA algorithm which is used to protect the data were found in the Side Channel Analysis. The RSA is especially vulnerable to Power Analysis which uses power consumption when the algorithm is working. Typically Power Analysis is divided into SPA(Simple Power Analysis) and DPA(Differential Power Analysis). On top of this, there is a CA(Collision Analysis) which is a very powerful attack. CA makes it possible to attack using a single waveform, even if the algorithm is designed to secure against SPA and DPA. So Message blinding, which applies the window method, was considered as a countermeasure. But, this method does not provide sufficient safety when the window size is small. Therefore, in this paper, we propose a new countermeasure that provides higher safety against CA. Our countermeasure is a combination of message and exponent blinding which is applied to the window method. In addition, through experiments, we have shown that our countermeasure provides approximately 124% higher attack complexity when the window size is small. Thus it can provide higher safety against CA.

Performance Analysis of MVDR and RLS Beamforming Using Systolic Array Structure (시스토릭 어레이 구조를 갖는 최소분산 비왜곡응답 및 최소자승 회귀 빔형성기법 성능 분석)

  • 이호중;서상우;이원철
    • The Journal of the Acoustical Society of Korea
    • /
    • v.22 no.1
    • /
    • pp.1-6
    • /
    • 2003
  • This paper analyses the performance of either the minimum variance distortionless response (MVDR) or the recursive least square (RLS) beamformer structured on the systolic array. Provided that the snapshot vector including the desired user's signal and the interferences with the noise is received at the array antenna. In order to improve the quality of received signal, MVDR or RLS algorithm can be utilized to update the beamformer weights recursively. Furthermore to increase the channel capacity, by the usage of the above schemes, the effect of the spatial filtering can be obtained which constructively combining multipath components corresponding to the desired user whereas the multiple access interferences (MAI) is nulled out on spatial domain. This paper introduces the MVDR and RLS beamformer structured on systolic array conducting the spatial filtering, and its performance under the multipath fading channel in the presence of multiple access interferences will be analyzed. To show the superior spatial filtering performances of the proposed scheme employing the systolic way structured beamformer, the computer simulations are carried out. And the validity of practical deployment of the proposed scheme will be confirmed throughout showing the BER behaviors and the beampatterns.

A Theoretical Review on the Untact Marketing of the COVID-19 Period Hospitality Industry Services (코로나 시대 환대산업 서비스의 언택트 마케팅에 관한 고찰)

  • Kang, Hee-Seog;Lee, Youn-Oak
    • Journal of Korea Entertainment Industry Association
    • /
    • v.14 no.7
    • /
    • pp.161-173
    • /
    • 2020
  • In-depth interview in the field of hospitality industry services was conducted in COVID- 19. Introduction of kiosks for non-face-to-face services using untact technology, reservation, pay systems, self-service, service improvement using room service should be carried out. It is also necessary to implement Instagram, Facebook, YouTube, P-blogs, online broadcasting and live commerce through the establishment of m-channel system through untact marketing sales channels in the hospitality industry now that the product composition to solve the pro -blem of untact marketing is drawing attention due to diversification of online sales channe -ls. Now, the recognition of important elements of service education and a establishment of differentiated system of untact marketing, expansion of untact sale channel, implementation of non-face-to-face counseling service and introduction of pre-booking, telecommuting were recognized as urgent parts. In particular, a service differentiation and importance of human services, which were recognized free of charge, have re-recognized as premium, and quality service aspect of the hospitality industry in untact and the direction to diversify marketing channels are presented.

PCA­based Waveform Classification of Rabbit Retinal Ganglion Cell Activity (주성분분석을 이용한 토끼 망막 신경절세포의 활동전위 파형 분류)

  • 진계환;조현숙;이태수;구용숙
    • Progress in Medical Physics
    • /
    • v.14 no.4
    • /
    • pp.211-217
    • /
    • 2003
  • The Principal component analysis (PCA) is a well-known data analysis method that is useful in linear feature extraction and data compression. The PCA is a linear transformation that applies an orthogonal rotation to the original data, so as to maximize the retained variance. PCA is a classical technique for obtaining an optimal overall mapping of linearly dependent patterns of correlation between variables (e.g. neurons). PCA provides, in the mean-squared error sense, an optimal linear mapping of the signals which are spread across a group of variables. These signals are concentrated into the first few components, while the noise, i.e. variance which is uncorrelated across variables, is sequestered in the remaining components. PCA has been used extensively to resolve temporal patterns in neurophysiological recordings. Because the retinal signal is stochastic process, PCA can be used to identify the retinal spikes. With excised rabbit eye, retina was isolated. A piece of retina was attached with the ganglion cell side to the surface of the microelectrode array (MEA). The MEA consisted of glass plate with 60 substrate integrated and insulated golden connection lanes terminating in an 8${\times}$8 array (spacing 200 $\mu$m, electrode diameter 30 $\mu$m) in the center of the plate. The MEA 60 system was used for the recording of retinal ganglion cell activity. The action potentials of each channel were sorted by off­line analysis tool. Spikes were detected with a threshold criterion and sorted according to their principal component composition. The first (PC1) and second principal component values (PC2) were calculated using all the waveforms of the each channel and all n time points in the waveform, where several clusters could be separated clearly in two dimension. We verified that PCA-based waveform detection was effective as an initial approach for spike sorting method.

  • PDF