• Title/Summary/Keyword: Active S-box

Search Result 51, Processing Time 0.021 seconds

Secure Block Cipher Algorithm for DC and LC (DC와 LC에 안전한 SPN 구조 암호 알고리즘)

  • Choe, Eun-Hwa;Seo, Chang-Ho;Seong, Su-Hak;Ryu, Hui-Su;Jeon, Gil-Su
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.445-452
    • /
    • 2002
  • In this paper, we suggest the design of 128bit block cipher which is provable security based on mathematics theory. We have derived the 16$\times$16 matrix(i.e.,linear transformation) which is numerous active S-box, and we proved for DC and LC which prove method about security of SPN structure cipher algorithm. Also, the minimum number of active S-box, the maximum differential probabilities and the maximum linear probabilities in round function of 128bit block cipher algorithm which has an effect to DC and LC are derived.

A Study on the Active children's Clothes in the Latter Part of the 18th Century in England -In Relation with Rousseau's Naturalism (18세기 후기 영국에서의 고중적인 어린이 의복 출현에 관한 연구-루소의 자연주의 교육사상과 관련하여-)

  • 이선희;신상옥
    • Journal of the Korean Society of Costume
    • /
    • v.39
    • /
    • pp.139-166
    • /
    • 1998
  • This dissertation is to help understanding about the emergence of active children's clothes in the latter part of the 18th century in England. In previous ages children had not been look-ed upon as children, but as incomplete and in-ferior men and women, the costume of children had not been distinguishable from that of their elders. The early eighteenth-century chil-d could not play in comfort because they dressed like their parents. But in the third quarther of the eighteenth century children became free from their con-comfortable and became active. English chil-dren's clothes was prevailing even in Europe as well. In the background of this liberation, there were many enlightened ideas, such as philosophers of enlightenment, doctors, writers, educators. Among these John Locke and Jean Jacque Rousseau criticized openly about rampant fashion which was distorting the body by corset and hoop. Rousseau was the one who wrote$\boxDr$Emile$\boxUl$and played the most important role to free children from an old fashioned idea, and emphasized to bring up children by the natural process of mental and physical development as human beings are a part of nature. Fashion reflects politic, economic, social, ideology, culture of the days and these factor function to create fashion which shows“Time Spirit”.Children's clothes, like those of their parents, follow the fashion, but with a difference, the form of which varies with the attitude to the child. Thus this dissertation was to study in relation with the background of the times in the latter part of 18th century in England and Rousseau's Naturalism in connection with the emergence of active children's clothes. The result is that diffusion of the idea of freedom and equality, the growth of bourgeoisie, the development of clothing and tex-tile industry have influenced to the emergence of active children's clothes. Also a great deal of middle and high class parents devoted to their children's education and was influenced by Rousseau's Naturalism. Specially the bourgeoisie who made their fortune by their own effort were eager to educate their achievement and business by their children through education. This factor influenced to the children's clothes as well.

  • PDF

The Realization of the Wireless Internet DGPS for LBS (LBS를 위한 무선 인터넷 DGPS 구현)

  • Kang, Joon-Mook;Cho, Sung-Ho;Lee, Eun-Soo
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.16 no.1
    • /
    • pp.3-12
    • /
    • 2008
  • This research is to construct wireless internet DGPS using MS Visual Basic Active X control for LBS. The coordinate correction method was used in this system because of convenience of both direction communication on Web. The PictureBox control and bitblt function were used in coordinate display module. The MS Comm control, MS Winsock control (TCP/IP), MS CommonDialog control, MS Sysinfo control were used in internet DGPS communication module and published on Web. Realtime internet DGPS were tested using the system which developed in this study and near realtime monitoring through this system could be performed.

  • PDF

Inhibitory Activity of Pesticide-preventing Active Carbon Fiber Mask on the Penetration of Pesticide and its Inhibitory Effect on Acute Inhalation Toxicity in Rats (탄소섬유 방제 마스크의 농약차단효과 및 흰쥐의 급성 흡입독성 예방효과)

  • Kim, Chang-Jong;Choi, Hyun-Ho;Shim, Sang-Soo;Shin, Hwa-Woo
    • YAKHAK HOEJI
    • /
    • v.42 no.4
    • /
    • pp.447-458
    • /
    • 1998
  • Inhibitory activity of pesticide-preventing active carbon fiber mask on the penetrations in pesticide spray and its inhibitory effect on acute inhalation toxicity in rats were s tudied. Pesticides were sprayed into box ($1.O{\times}1.2{\tmies}O.6\;m$) at a dose of 20ml/min of diazinon ($Diatone^{TM}$) suspension (340ppm) and 5g/min of BPMC powder (2.0%) for 4 hours, and then captured the penetrated pesticides into water via mask in box under 8l/sec suction. The pesticides were analysed by A.O.A.C. method and GC/MS. Pesticide-preventing active carbon fiber mask significantly inhibited the penetration of diazinon by 93.4% as compared with control, and cotton mask and pesticide-preventing mask did it by 74.2% and 83.7%,respectively. This result shows that pesticide-preventing active carbon fiber mask has the most prominent inhibitory effect in preventing the penetration of diazinone. In the penetration of BPMC, all of three masks, such as active carbon fiber mask, cotton mask and pesticide-preventing mask, have a similar inhibitory effect, which were 99.3%, 98.6% and 97.0%, respectively. The penetrated pesticides via pesticide-preventmg active carbon fiber mask did not exert acute inhalation toxicity.

  • PDF

Development and Security Analysis of GIFT-64-Variant That Can Be Efficiently Implemented by Bit-Slice Technique (효율적인 비트 슬라이스 구현이 가능한 GIFT-64-variant 개발 및 안전성 분석)

  • Baek, Seungjun;Kim, Hangi;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.349-356
    • /
    • 2020
  • GIFT is a PRESENT-like cryptographic algorithm proposed in CHES 2017 and used S-box that can be implemented through a bit-slice technique[1]. Since bit-permutation is used as a linear layer, it can be efficiently implemented in hardware, but bit-slice implementation in software requires a specific conversion process, which is costly. In this paper, we propose a new bit-permutation that enables efficient bit-slice implementation and GIFT-64-variant using it. GIFT-64-variant has better safety than the existing GIFT in terms of differential and linear cryptanalysis.

A Research on the State of Korean Seafood Marketing at the Colonial Period - Focused on the West Coast - (일제강점기의 수산적 유수실태에 관한 고찰 -서해안 지역을 중심으로-)

  • 김수관;두정완;윤영선
    • The Journal of Fisheries Business Administration
    • /
    • v.35 no.1
    • /
    • pp.133-168
    • /
    • 2004
  • The purpose of this study is to examine the state and characteristic of seafood marketing in Korean West Coast during the colonial period ruled by Japan. To accomplish the purpose, we tried to set the fisheries statistical database by reviewing of $\boxDr$Statistical Annual Report of Chosun Chongdokbu$\boxUl$ and $\boxDr$Official Report of Chosun Chongdokbu$\boxUl$. A trend analysis was carried out with the data. Also, by reviewing of articles related to the state of seafood marketing via $\boxDr$Daehan Maeil Newspaper$\boxUl$, $\boxDr$Maeil Newspaper$\boxUl$ issued at the period, we could find out some meaningful findings which backed up the statistics in realistic facts. For numbers of businessman in seafood marketing, it was clear that the number of Japanese businessmen increased more quickly than that of Korean compared with other sphere of fisheries. That means Japanese grasped Korean seafood market in a short time. In price of seafood in terms of cities, Kunsan was comparatively higher than Incheon and Mokpo. In price of seafood in terms of species, ‘Snapper’ was mostexpensive, and ‘Mackerel Pike’, ‘Anchovy’, ‘Mullet’, ‘Eel’, ‘Flatfish’ followed in that order. In price of a species in terms of ‘Yellow Croaker’, which was famous in West Sea, ‘Croaker with salt’ was more expensive than dried and fresh one. For the transition trend of number of fish market, we could ascertain that the number of market increased until 1919, however, it decreased slowly from 1932. That means Japanese government went to war against China from 1931. Of the West Coast, the number of fish market in Chungnam province was most high, but that of Chonbuk outrun from 1940. At that time, the number of fish market in West Coast reached to 34% out of that of whole country. In 1919, the proportion of seafood sales amount of West Coast neighboring provinces, such as Kyunggido, Chungnam, and Chonbuk, was 23% of whole country which rose to 28% in 1929, and 29% in 1939. Therefore, we could assure that seafood marketing was very active at that time in the region. When we consider the trend of seafood export at the main ports of West Coast, in 1910's, the export through Mokpo and Inchon port was very live but that of Kunsan was very tiny. However, in 1920's, the export amount of Inchon port did not much change, but that of Mokpo decreased, whereas, that of Kunsan increased. In the early and middle of 1910' s which was around beginning of Japanese ruling period, we realized that the imperialist Japan was very eager in political efforts to enhance the mind of seafood's quality improvement through the opening of several fisheries competitive shows and fairs.

  • PDF

MILP-Espresso-Based Automatic Searching Method for Differential Charactertistics (효율적인 MILP-Espresso 기반 차분 특성 자동 탐색 방법)

  • Park, YeonJi;Lee, HoChang;Hong, Deukjo;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.533-543
    • /
    • 2018
  • In this paper, we propose an MILP-based method for Optimal Probability of Bit-based Differential Characteristic in SP(Substitution-permutation) ciphers based on Automatic Differential Characteristic Searching Method of Sasaki, et al. In [13], they used input/output variables and probability variables seperatably, but we simplify searching procedure by putting them(variables) together into linear inequalities. Also, In order to decrease the more linear inequalities, we choose Espresso algorithm among that used by Sasaki, et al(Quine-McCluskey algorithm & Espresso algorithm). Moreover, we apply our method to GIFT-64, GIFT-128, SKINNY-64, and we obtained results in the GIFT(Active S-boxs : 6, Probabilities : $2^{-11.415}$) compared with the existing one.(Active S-boxs : 5, Probabilities : unknown). In case of SKINNY-64, we can't find better result, but can find same result compared with the existing one.

Revisited Security Evaluation on Midori-64 against Differential Cryptanalysis

  • Guoyong Han;Hongluan Zhao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.2
    • /
    • pp.478-493
    • /
    • 2024
  • In this paper, the Mixed Integer Linear Programming (MILP) model is improved for searching differential characteristics of block cipher Midori-64, and 4 search strategies of differential path are given. By using strategy IV, set 1 S-box on the top of the distinguisher to be active, and set 3 S-boxes at the bottom to be active and the difference to be the same, then we obtain a 5-round differential characteristics. Based on the distinguisher, we attack 12-round Midori-64 with data and time complexities of 263 and 2103.83, respectively. To our best knowledge, these results are superior to current ones.

Circular Dichroism of Optically Active Poly(dialkylsilane) Aggregates in Microcapsules

  • Terao, Ken;Kikuchi, Noriaki;Sato, Takahiro;Teramoto, Akio;Fujiki, Michiya;Dobashi2, Toshiaki
    • Proceedings of the Polymer Society of Korea Conference
    • /
    • 2006.10a
    • /
    • pp.344-344
    • /
    • 2006
  • Poly(n-hexyl-(S)-3-methylpentylsilane) aggregates confined in microcapsules to keep the aggregation number and ranging in average polymer mass in a microcapsule from $2{\Box}10^{-16}\;to\;2{\Box}10^{-14}g$. were studied by circular dichroism measurements in ethanol (a non solvent) and tetrahydrofuran (an associative solvent at low temperature) at varioustemperatures. The size of each aggregate did not affect the optical activity because the circular dichroism was proportional to the aggregation number at the same condition. Moreover, the circular dichroism appreciably reflected the prepared method, i.e. temperature and solvent.

  • PDF

Impossible Differential Cryptanalysis on ESF Algorithm with Simplified MILP Model

  • Wu, Xiaonian;Yan, Jiaxu;Li, Lingchen;Zhang, Runlian;Yuan, Pinghai;Wang, Yujue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.10
    • /
    • pp.3815-3833
    • /
    • 2021
  • MILP-based automatic search is the most common method in analyzing the security of cryptographic algorithms. However, this method brings many issues such as low efficiency due to the large size of the model, and the difficulty in finding the contradiction of the impossible differential distinguisher. To analyze the security of ESF algorithm, this paper introduces a simplified MILP-based search model of the differential distinguisher by reducing constrains of XOR and S-box operations, and variables by combining cyclic shift with its adjacent operations. Also, a new method to find contradictions of the impossible differential distinguisher is proposed by introducing temporary variables, which can avoid wrong and miss selection of contradictions. Based on a 9-round impossible differential distinguisher, 15-round attack of ESF can be achieved by extending forward and backward 3-round in single-key setting. Compared with existing results, the exact lower bound of differential active S-boxes in single-key setting for 10-round ESF are improved. Also, 2108 9-round impossible differential distinguishers in single-key setting and 14 12-round impossible differential distinguishers in related-key setting are obtained. Especially, the round of the discovered impossible differential distinguisher in related-key setting is the highest, and compared with the previous results, this attack achieves the highest round number in single-key setting.