• Title/Summary/Keyword: Aria

Search Result 178, Processing Time 0.024 seconds

Implementation of AES and ARIA algorithm with Secure Structure for Power Analysis using LFSR Masking

  • Kang, Young-Jin;Kim, Ki-Hwan;Lee, Hoon Jae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.1
    • /
    • pp.79-86
    • /
    • 2020
  • In this paper, we analyzed the case vulnerable to the power analysis attack of the ARIA algorithm and AES algorithm. Through this, we propose an algorithm with a safe structure for power analysis and prove through experiment. The proposed technique is a masking method using LFSR with a cyclic structure. To verify this, 1000, 2000, and 4000 power traces were collected, and the corresponding results are shown and proved. We used ATmega328 Chip for Arduino Uno for the experiment and mounted each algorithm. In order to measure the power consumption, a resistor was inserted and then proceeded. The analysis results show that the proposed structure has a safe structure for power analysis. In the future, we will study ways to lead to performance enhancement.

An ARIA-Interacting AP2 Domain Protein Is a Novel Component of ABA Signaling

  • Lee, Sun-ji;Cho, Dong-im;Kang, Jung-youn;Kim, Soo Young
    • Molecules and Cells
    • /
    • v.27 no.4
    • /
    • pp.409-416
    • /
    • 2009
  • ADAP is an AP2-domain protein that interacts with ARIA, which, in turn, interacts with ABF2, a bZIP class transcription factor. ABF2 regulates various aspects of the abscisic acid (ABA) response by controlling the expression of a subset of ABA-responsive genes. Our expression analyses indicate that ADAP is expressed in roots, emerging young leaves, and flowers. We found that adap knockout mutant lines germinate more efficiently than wild-type plants and that the mutant seedlings grow faster. This suggests that ADAP is involved in the regulation of germination and seedling growth. Both germination and post-germination growth of the knockout mutants were partially insensitive to ABA, which indicates that ADAP is required for a full ABA response. The survival rates for mutants from which water was withheld were low compared with those for wild-type plants. The result shows that ADAP is necessary for the response to stress induced by water deprivation. Together, our data indicate that ADAP is a positive regulator of the ABA response and is also involved in regulating seedling growth. The role of ADAP is similar to that of ARIA, which is also a positive regulator of the ABA response. It appears that ADAP acts through the same ABA response pathway as ARIA.

Design of the Mail Protocol with Perfect Forward Security (전방향 안전성이 보장되는 메일 프로토콜 설계)

  • Shin, Seung-Soo;Han, Kun-Hee
    • Journal of the Korea Convergence Society
    • /
    • v.2 no.2
    • /
    • pp.13-19
    • /
    • 2011
  • When the existing mail system is attacked by the third party, its content is exposed fully. To solve this problem, designed is the mail encryption system which can send and receive mail safely by the sessionkey. The mail receiver opens encrypted mail with the session key. In the traditional mail system, the server administrator can view mail content. However, in the proposed protocol, the server can only save mail as encryption/decryption is applied. Also, the ARIA encryption algorithm is used in encryption/decryption for better safety, and fast XOR operations are used to reduce the amount of operations.

The Implementation of the Index Search System in a Encrypted Data-base (암호화된 데이터베이스에서 인덱스 검색 시스템 구현)

  • Shin, Seung-Soo;Han, Kun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.5
    • /
    • pp.1653-1660
    • /
    • 2010
  • The user information stored in database have been leaked frequently. To protect information against malevolent manager on the inside or outside aggressor, it is one of the most efficient way to encrypt information and store to database. It is better to destruct information than not to use encrypted information stored in database. The encrypted database search system is developed variously, and used widely in many fields. In this paper, we implemented the scheme that can search encrypted document without exposing user's information to the untrusted server in mobile device. We compared and analyzed the result embodied with DES, AES, and ARIA based on symmetric key by searching time.

Differential Fault Analysis on AES by Recovering of Intermediate Ciphertext (중간 암호문 복구 방법을 이용한 AES 차분오류공격)

  • Baek, Yi-Roo;Gil, Kwang-Eun;Park, Jea-Hoon;Moon, Sang-Jae;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.167-174
    • /
    • 2009
  • Recently, Li et al. proposed a new differential fault analysis(DFA) attack on the block cipher ARIA using about 45 ciphertexts. In this paper, we apply their DFA skill on AES and improve attack method and its analysis. The basic idea of our DFA method is that we recover intermediate ciphertexts in last round using final faulty ciphertexts and find out last round secret key. In addition, we present detail DFA procedure on AES and analysis of complexity. Furthermore computer simulation result shows that we can recover its 128-bit secret key by introducing a correct ciphertext and 2 faulty ciphertexts.

A Study on the Feminism Represented in Anne Teresa De Keersmaeker's Works (페미니즘 관점으로 본 안느 테레사 드 키어스매커(Anne Teresa De Keersmaeker)의 <로사스 댄스 로사스 Rosas danst Rosas>, <에레나의 아리아 Elena's Aria> 작품 분석 연구)

  • JUNG, Soodong
    • Trans-
    • /
    • v.5
    • /
    • pp.83-111
    • /
    • 2018
  • This study aims to analyze early works of contemporary Europe female choreographer Anne Teresa de Keersmaeker, which are Rosas danst Rosas, Elena's Aria in terms of feminism. Started from 18C, feminism movements have changed the perception and conception of women. Since then, women in the work of art have been portrayed to be more powerful and independent than weakened images. The influence of feminism in this era made transition to let female artists act more outstandingly nowadays. Therefore, the study began with the need to reflect the image and role of female dancers in the artistic work with the viewpoints of feminism in the flows of social and cultural background. Works of Rosas danst Rosas represents the aspects of radical feminism. Physical suppression of female dancer reflects liberation of free will. Post-modern feminism is displayed at Rosas danst Rosas which escaped from original portrait of women and exposed new active contemporary image of woman. The Elena's Aria, Radial feminism is represented physical suppression of female dancer reflects liberation of free will. Through analysis of Anne Teresa's works with feminine sight, her works were mainly influenced by feminism occurred after 1980's. Having found other possibilities to explore her choreographic philosophy, insufficiency of domestic data about Anne Teresa was once again reckoned. The researcher hopes that by studying Anne Teresa from the feminist point of view, the various images produced by dancers will not disappear right away, rather creating a sense of unity and development without losing the meaning.

  • PDF

Security Method on the Multi-modal Biometrics Data (암호이론을 이용한 다중생체데이터 전송상의 보안)

  • Go Hyeon-Ju;Yu Byeong-Jin;Kim Yong-Min;Jeon Myeong-Geun
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2006.05a
    • /
    • pp.183-186
    • /
    • 2006
  • 생체인식은 정보처리시스템에 있어서 네트웍 보안, 시스템 보안, 어플리케이션 보안 등에 사용되는 개인인증 및 확인을 위한 하나의 기법으로 볼 수 있으며, 개인정보를 포함한 데이터의 보호를 위해서 본인이나 승인된 사용자만이 네트웍이나 물리적 접근 등을 통하여 접근하고자 하는 것이다. 본 논문에서는 얼굴인식과 홍채인식 시스템을 융합한 다중생체인식 시스템을 구현하였으며, 다중생체인식 시스템에서 구현된 생체데이터를 안전하게 전송할 수 있는 방법으로 블록 암호 알고리듬 ARIA를 침입에 대한 보안 방법으로 제안하였다. 이에 다중생체 특징벡터를 128비트의 블록 크기를 이용하여 암호화 하였으며, 생체 특징벡터를 이용하여 128비트의 키로 사용하였다.

  • PDF

Synthesis of a Porphyrin Derivative Covalently linked to Nickel Aza-macrocycle Cemplex

  • Shin, Eun-Ju;Kwak, Chee-Hun
    • Journal of Photoscience
    • /
    • v.9 no.1
    • /
    • pp.9-12
    • /
    • 2002
  • A porphyrin derivative covalently tinted to Ni aria-macrocycle complex has been prepared. Absorption spectrum of porphyrin-Ni aria-macrocycle dyad (λ$\^$max/$\sub$a/=227 nm) was observed to similar to a sum of those of tetratolylporphyrin (λ$\^$max/$\sub$a/=419 nm) and Ni aza-macrocycle (λ$\^$max/$\sub$a/=227 nm), indicating no electronic interaction between porphyrin and Ni aza-macrocycle moieties. Fluorescence quantum yield of dyad (${\Phi}$$\sub$f/= 0.10) was same to that of tetratolylporphyrin (${\Phi}$$\sub$f/= 0.10). Photoinduced intramolecular electron transfer or energy transfer from excited porphyrin moiety to Ni(II) aza-macrocycle moiety should be very inefficient in dyad.

  • PDF

Modified Feistel Network Block Cipher Algorithm (변형 피스탈 네트워크 블록 암호 알고리즘)

  • Cho, Gyeong-Yeon;Song, Hong-Bok
    • Journal of the Korea Computer Industry Society
    • /
    • v.10 no.3
    • /
    • pp.105-114
    • /
    • 2009
  • In this paper a modified Feistel network 128 bit block cipher algorithm is proposed. The proposed algorithm has a 128, 196 or 256 bit key and it updates a selected 32 bit word from input value whole by deformed Feistel Network structure. Existing of such structural special quality is getting into block cipher algorithms and big distinction. The proposed block cipher algorithm shows much improved software speed compared with international standard block cipher algorithm AES and domestic standard block cipher algorithm SEED and ARIA. It may be utilized much in same field coming smart card that must perform in limited environment if use these special quality.

  • PDF

Performance Analysis of the Encryption Algorithms in a Satellite Communication Network based on H-ARQ (H-ARQ 기반 위성통신망에서 암호화 알고리즘에 따른 성능 분석)

  • Jeong, Won Ho;Yeo, Bong-Gu;Kim, Ki-Hong;Park, Sang-Hyun;Yang, Sang-Woon;Lim, Jeong-Seok;Kim, Kyung-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.45-52
    • /
    • 2015
  • Since the broadcast message in satellite signals the security of the data is extremely poor compared to other communication technologies such as the broadcast signal. Thus, encryption of the communication satellite has become a very important issue, an analysis of the communication performance of a general service is always required. In this paper, In order to analyze the encrypted communication the turbo code in an IP-based satellite communication applies the code rate compatible punctured and The wireless channel in consideration of the actual satellite communication was constructed by placing a weight on the Rayleigh fading and the Rician fading two channels. Retransmission-based error control scheme were constructed in the best performance of H-ARQ Type-II, III scheme of a number of ways that are recently considered. we analyzed the effects of normal service against a satellite communication network The security services were configured with encryption algorithms AES, ARIA (CTR, CBC mode).