• Title/Summary/Keyword: Code 128

Search Result 121, Processing Time 0.028 seconds

A Study on S-Function in SEED Cryptosystem (SEED암호에서 S-함수에 대한 고찰)

  • Yang, Jeong-Mo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1295-1305
    • /
    • 2017
  • There is SEED cryptosystem in domestic block cipher standard. This code was drafted by the Korea Information Security Agency (KISA) in October 1998 and underwent a public verification process in December of the same year, which resulted in the final amendment to improve safety and performance. Unlike DES, it is a 128-bit block cipher that has been passed through various processes and established in 2005 as an international standard. It is a block cipher with a pastel structure like DES, but the input bit block has been increased to 128 bits, double DES. In this paper, first, we introduce the general algorithm of SEED cryptosystem and analyzed mathematically generating principle of key-value which is used in F-function. Secondly, we developed a table that calculates the exponent of the primitive element ${\alpha}$ corresponding to the 8-bit input value of the S-function and finally analyzed calculating principle of S-function designed in G-function through the new theorem and example. Through this course, we hope that it is to be suggest the ideas and background theory needed in developing new cryptosystem to cover the weakness of SEED cryptosystem.

Optimized Implementation of Lightweight Block Cipher PIPO Using T-Table (T-table을 사용한 경량 블록 암호 PIPO의 최적화 구현)

  • Minsig Choi;Sunyeop Kim;Insung Kim;Hanbeom Shin;Seonggyeom Kim;Seokhie Hong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.391-399
    • /
    • 2023
  • In this paper, we presents for the first time an implementation using T-table for PIPO-64/128, 256 which are lightweight block ciphers. While our proposed implementation requires 16 T-tables, we show that the two types of T-tables are circulant and obtain variants implementations that require a smaller number of T-tables. We then discuss trade-off between the number of required T-tables (code size) and throughput by evaluating the throughput of the variant implementations on an Intel Core i7-9700K processor. The throughput-optimized versions for PIPO-64/128, 256 provide better throughput than TLU(Table-Look-Up) reference implementation by factors of 3.11 and 2.76, respectively, and bit-slice reference implementation by factors of 3.11 and 2.76, respectively.

A Study on a Phase-encoded Multiplexing Method in Holographic Memory System (홀로그래픽 메모리시스템에서 위상 다중화 인코딩에 관한 연구)

  • Cho, Byung-Chul;Kim, Kyu-Tae;Gil, Sang-Keun;Kim, Eun-Soo
    • Journal of the Korean Institute of Telematics and Electronics D
    • /
    • v.36D no.10
    • /
    • pp.51-60
    • /
    • 1999
  • For an effective phase-multiplexing in holographic memory system, four types of phase code used as reference beam are generated. In case of $32 {\times} 32$ address beam, a phase error with 0%, 5%, 10% 15%, 20%, and 25% error rate, is purposely added to the real phase values in order to consider the practical SLM's nonlinear characteristics of phase modulation in computer simulation, cross talks and SNRs are comparatively analysed for these phase-codes by the auto and cross-correlation. Pseudo-Random(PSR) Phase Code has the lowest cross-correlation mean value of 0.067 among four types of Phase Code, which means the SNR of the PSR is higher than other Phase Codes. Also, the standard deviation of the PSR phase code indicating the degree of recalled data degradation is the lowest value of 0.0113.

  • PDF

AutoML Machine Learning-Based for Detecting Qshing Attacks Malicious URL Classification Technology Research and Service Implementation (큐싱 공격 탐지를 위한 AutoML 머신러닝 기반 악성 URL 분류 기술 연구 및 서비스 구현)

  • Dong-Young Kim;Gi-Seong Hwang
    • Smart Media Journal
    • /
    • v.13 no.6
    • /
    • pp.9-15
    • /
    • 2024
  • In recent trends, there has been an increase in 'Qshing' attacks, a hybrid form of phishing that exploits fake QR (Quick Response) codes impersonating government agencies to steal personal and financial information. Particularly, this attack method is characterized by its stealthiness, as victims can be redirected to phishing pages or led to download malicious software simply by scanning a QR code, making it difficult for them to realize they have been targeted. In this paper, we have developed a classification technique utilizing machine learning algorithms to identify the maliciousness of URLs embedded in QR codes, and we have explored ways to integrate this with existing QR code readers. To this end, we constructed a dataset from 128,587 malicious URLs and 428,102 benign URLs, extracting 35 different features such as protocol and parameters, and used AutoML to identify the optimal algorithm and hyperparameters, achieving an accuracy of approximately 87.37%. Following this, we designed the integration of the trained classification model with existing QR code readers to implement a service capable of countering Qshing attacks. In conclusion, our findings confirm that deriving an optimized algorithm for classifying malicious URLs in QR codes and integrating it with existing QR code readers presents a viable solution to combat Qshing attacks.

Optimization of Parallel Code for Noise Prediction in an Axial Fan Using MPI One-Sided Communication (MPI 일방향통신을 이용한 축류 팬 주위 소음해석 병렬프로그램 최적화)

  • Kwon, Oh-Kyoung;Park, Keuntae;Choi, Haecheon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.3
    • /
    • pp.67-72
    • /
    • 2018
  • Recently, noise reduction in an axial fan producing the small pressure rise and large flow rate, which is one type of turbomachine, is recognized as essential. This study describes the design and optimization techniques of MPI parallel program to simulate the flow-induced noise in the axial fan. In order to simulate the code using 100 million number of grids for flow and 70,000 points for noise sources, we parallelize it using the 2D domain decomposition. However, when it is involved many computing cores, it is getting slower because of MPI communication overhead among nodes, especially for the noise simulation. Thus, it is adopted the one-sided communication to reduce the overhead of MPI communication. Moreover, the allocated memory and communication between cores are optimized, thereby improving 2.97x compared to the original one. Finally, it is achieved 12x and 6x faster using 6,144 and 128 computing cores of KISTI Tachyon2 than using 256 and 16 computing cores for the flow and noise simulations, respectively.

Prevention Scheme of DDoS Attack in Mobile WiMAX Networks Using Shared Authentication Information (Mobile WiMAX 네트워크에서 공유 인증 정보를 이용한 분산 서비스 거부 공격 방어)

  • Kim, Young-Wook;Bahk, Sae-Woong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.2B
    • /
    • pp.162-169
    • /
    • 2009
  • Message Authentication Code (MAC) assures integrity of messages. In Mobile WiMAX, 128-bit Cipher-based MAC (CMAC) is calculated for management messages but only the least significant half is actually used truncating the most significant 64 bits. Naming these unused most significant 64bits Shared Authentication Information (SAI), we suggest that SAI can be applied to protect the network from DDoS attack which exploits idle mode vulnerabilities. Since SAI is the unused half of CMAC, it is as secure as 64bits of CMAC and no additional calculations are needed to obtain it. Moreover, SAI doesn't have to be exchanged through air interface and shared only among MS, BS, and ASN Gateway. With these good properties, SAI can efficiently reduce the overheads of BS and ASN GW under the DDoS attack.

Design and Fabrication of a Convex Array Ultrasonic Transducer with Finite Element Analysis (유한요소 해석법을 이용한 컨벡스 배열형 초음파 탐촉자의 설계 및 제작)

  • Lee, Su-Sung;Kwon, Jae-Hwa;Eun, Hong;Roh, Yong-Rae
    • The Journal of the Acoustical Society of Korea
    • /
    • v.21 no.7
    • /
    • pp.592-599
    • /
    • 2002
  • In this study, an ultrasonic transducer was designed with a commercial finite element analysis (FEA) code, PZFlex, and fabricated based on the design. The transducer has the dimension and shape suitable for abdomen diagnosis working at 5 ㎒ and consists of 128 piezoelectric elements disposed in a convex linear array form. The transducer is composed of two impedance matching layers, one backing layer, and kerfs placed between the piezoelectric elements. Validity of the design with the FEA was illustrated through experimental characterization of a sample transducer. Comparison with the design results by equivalent circuit analysis method was also made to check the superiority of the FEA design.

Effect of Flame Spray Distance on Particle Behavior and Morphological Characteristics of $Ni_{20}Cr$ Coated Layers (화염용사 거리에 따른 입자의 거동 및 $Ni_{20}Cr$ 코팅층 특성 연구)

  • Lee, Jae Bin;Shin, Dong Hwan;Lee, Seong Hyuk
    • Journal of ILASS-Korea
    • /
    • v.17 no.3
    • /
    • pp.128-133
    • /
    • 2012
  • The present study aims to examine the influence of flame spray distance on the thermal behavior of micro-metal particles and the morphological characteristics of $Ni_{20}Cr$ layers coated on the preheated SCM415 substrates by using the conventional flame spray system. Commercially available nickel-based $Ni_{20}Cr$ particles with a mean diameter of $45{\mu}m$ were used. In addition, CFD simulations using a commercial code (FLUENT ver. 6.3.26) were conducted to estimate temperature and velocity distributions of the continuous and discrete phases before impact on the substrate. From FE-SEM images of coated layers on the substrates, it was observed that as the spray distance decreased, the metal particle morphology showed splash-like patterns and such a short stretch shape, resulting from higher particle momentums and the impact of partially melted particles. Moreover, it was found that the spray distance should be considered as one of important parameters in controlling the porosity and the adhesion strength.

A Spectropolarimetric Investigation of the Photospheric and Chromospheric Layers of Sunspots

  • Kim, Hyunnam;Solanki, Sami.K.;Lagg, Andreas;Kim, Kap-Sung;Lim, Daye;Choe, G.S.
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.37 no.2
    • /
    • pp.128.2-128.2
    • /
    • 2012
  • Spectro-polarimetry is the most powerful technique for deducing the magnetic structure of the Sun. Stokes vector allow us to infer the physical conditions in the solar atmosphere prevailing during the line formation. Inversion codes are the main tool to extract this information from the Stokes spectra. This study will focus on measurements of the chromospheric He I 1083.0 nm triplet and the photospheric Si I 1082.7 nm line. A spectropolarimetric data set of sunspots, obtained with the German Vacuum Tower Telescope (VTT) at the Teide observatory on Tenerife, is analyzed using an inversion technique. We will introduce the German Vacuum Tower Telescope and the inversion code HeLix, and will show data sets that are analyzed by HeLix. Finally I made variety plots and maps for understanding photospheric and chromospheric layers of sunspots.

  • PDF

A Survey on Machine Learning-Based Code Authorship Identification (머신 러닝 기반 코드 작성자 식별 기술에 대한 조망)

  • Kim, Hyun-Jun;Ahn, Sun-woo;Ahn, Seong-gwan;Nam, Kevin;Paek, Yun-Heung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.128-131
    • /
    • 2021
  • 본 논문에서는 특정 코드를 분석하여 해당 코드를 작성한 저자가 누구인지 식별할 수 있는 머신 러닝 기반 코드 저자 식별 기술에 대해 소개한다. 먼저 소스 코드를 분석하여 저자를 확인하는 기법들에 알아볼 것이다. 또한 저자를 식별할 수 있는 정보가 다소 소실된 바이너리 코드를 분석하여 저자를 확인하는 기법을 살펴본 다음, 저자 식별 기법의 향후 연구 방향에 대해 탐색하고자 한다.