• Title/Summary/Keyword: HIGHT algorithm

Search Result 31, Processing Time 0.025 seconds

Speed-optimized Implementation of HIGHT Block Cipher Algorithm (HIGHT 블록 암호 알고리즘의 고속화 구현)

  • Baek, Eun-Tae;Lee, Mun-Kyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.495-504
    • /
    • 2012
  • This paper presents various speed optimization techniques for software implementation of the HIGHT block cipher on CPUs and GPUs. We considered 32-bit and 64-bit operating systems for CPU implementations. After we applied the bit-slicing and byte-slicing techniques to HIGHT, the encryption speed recorded 1.48Gbps over the intel core i7 920 CPU with a 64-bit operating system, which is up to 2.4 times faster than the previous implementation. We also implemented HIGHT on an NVIDIA GPU equipped with CUDA, and applied various optimization techniques, such as storing most frequently used data like subkeys and the F lookup table in the shared memory; and using coalesced access when reading data from the global memory. To our knowledge, this is the first result that implements and optimizes HIGHT on a GPU. We verified that the byte-slicing technique guarantees a speed-up of more than 20%, resulting a speed which is 31 times faster than that on a CPU.

Development of Media Crypto Algorithm for anti-hacking into CCTV (CCTV 해킹방지를 위한 미디어 암호화 알고리즘)

  • Hwang, Seon-Cheol
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.62 no.2
    • /
    • pp.98-102
    • /
    • 2013
  • There are so many CCTV in our streets, buildings and public places. Nevertheless, security methods for CCTV are rarely. This paper describes a study on developing a media crypto algorithm for anti-hacking into CCTV. H.264 codec is used to compress the video stream in CCTV systems. HIGHT algorithm provided by KISA is adopted as a crypto algorithm in our development. Other crypto methods except HIGHT could be selected by company's security police. Only some bytes in VCL(Video Coding Layer) of H.264 are encrypted to improve the performance of limited platforms, such as CCTV, WebCam, smartphone. Very fast and light crypto algorithm was developed by our researches.

Development of multi-object image processing algorithm in a image plane (한 이미지 평면에 있는 다물체 화상처리 기법 개발)

  • 장완식;윤현권;김재확
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.555-555
    • /
    • 2000
  • This study is concentrated on the development of hight speed multi-object image processing algorithm, and based on these a1gorithm, vision control scheme is developed for the robot's position control in real time. Recently, the use of vision system is rapidly increasing in robot's position centre. To apply vision system in robot's position control, it is necessary to transform the physical coordinate of object into the image information acquired by CCD camera, which is called image processing. Thus, to control the robot's point position in real time, we have to know the center point of object in image plane. Particularly, in case of rigid body, the center points of multi-object must be calculated in a image plane at the same time. To solve these problems, the algorithm of multi-object for rigid body control is developed.

  • PDF

Differential Fault Analysis of the Block Cipher LEA (블록 암호 LEA에 대한 차분 오류 공격)

  • Park, Myungseo;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1117-1127
    • /
    • 2014
  • Differential Fault Analysis(DFA) is widely known for one of the most powerful method for analyzing block cipher. it is applicable to block cipher such as DES, AES, ARIA, SEED, and lightweight block cipher such as PRESENT, HIGHT. In this paper, we introduce a differential fault analysis on the lightweight block cipher LEA for the first time. we use 300 chosen fault injection ciphertexts to recover 128-bit master key. As a result of our attack, we found a full master key within an average of 40 minutes on a standard PC environment.

DQDMR Algorithm for Improved QoS of VoIP Services (VoIP 서비스의 QoS 향상을 위한 DQDMR 알고리즘)

  • 서세영;지홍일;최승권;조용환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.12B
    • /
    • pp.1100-1105
    • /
    • 2003
  • In this paper, we propose a solution, called DQDMR, for generating delay-constrained bandwidth- appropriated multicast routing trees to reduce end-to-end delay and conserved bandwidth resources. At the current router system the router keep the information of link which neighboring node in the routing table to guarantee QoS(Quality of Service). When we construct multicast tree, DQDMR algorithm dynamically adjusts the path in the least delay and appropriate bandwidth. Through simulations comparing to another multicast algorithms, we reach a conclusion that DQDMR algorithm can simply and dynamically adjusts the construction of multicast tree in hight-speed and conserve bandwidth resources.

M_DQDMR Algorithm for Improved QoS of Mobile VoIP Services (Mobile 환경에서 VoIP 서비스의 QoS 향상을 위한 M_DQDMR 알고리즘)

  • 서세영;최승권;신승수;조용환
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.05a
    • /
    • pp.383-389
    • /
    • 2003
  • In this paper, we propose a solution, called M_DQDMR, for generating delay-constrained boundwidth-appropriated multicast routing trees to reduce the delay and conserved boundwidth resources of nodes in mobile computing environment. At the current router installation, we according the routing table and the information of link which neighboring rude to guarantee QoS(Quality of Service). When we construct multicast tree, M_DQDMR algorithm dynamically adjusts its appropriate tree construction policy based on how far the destination node from the delay bound and boundwidth our QoS requirement. Through simulations and comparing to another multicast algorithm, we reach a conclusion is that M_DQDMR can simply and dynamically adjusts the construction of multicast tree in hight-speed and conserve boundwidth resources.

  • PDF

Performance Analysis and Development Algorithm Module using Block-ciphers in Cloud Computing Environment (클라우드 환경에서 블록 암호를 이용한 암·복호화 알고리즘 성능 분석 및 모듈 개발)

  • Lee, Hong-Jae;Shin, Jayhyung;Shin, Yong-Tae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.346-349
    • /
    • 2017
  • 클라우드 서비스가 점차 증가함에 따라 사용자가 클라우드에 데이터 및 파일을 저장하는 일이 빈번해졌다. 하지만 클라우드 환경에 특성상 사용자에 데이터는 통합되어 저장 관리되는데 이때 여러 가지의 정보 유출에 대비한 보안적인 측면의 연구가 필요하다. 본 논문에서는 데이터가 유출 되더라도 암호화를 통해서 유출 시에도 원본 데이터를 확인할 수 없도록 하는 암호화 모듈을 개발하였고 블록암호 알고리즘인 AES, ARIA, SEED, HIGHT, LEA를 통하여 각각의 알고리즘 안정성 및 성능을 분석 하여 클라우드 환경에서 가장 적합한 알고리즘을 확인하였다.

Hight throughput CORDIC-based Direct Digital Frequency Synthesizer (고속 CORDIC에 기반한 직접 디지털 주파수 합성기)

  • Park, Minkyoung;Park, Sungsoo;Kim, Kiseon;Lee, Jeong-A
    • Proceedings of the IEEK Conference
    • /
    • 1999.11a
    • /
    • pp.784-787
    • /
    • 1999
  • This paper describes a direct digital frequency synthesizer using the CORDIC algorithm, which can be implemented efficiently for a digital sinusoid synthesis. To optimize the hardware design parameters, we perform numerical analysis of the quantization effects for the CORDIC-based architecture. A pipelined architecture is employed to obtain a high data throughput,. We estimate and summarize its hardware costs for a variable accuracy, and a CORDIC-based architecture for 9 bit accuracy is emulated in FPGA.

  • PDF

The Development of Hazardous Waste Compact Dump incinerator for Low Emissions (저공해 compact 유해폐기물 dump 소각기 개발)

  • 전영남;채종성;정오진
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.16 no.6
    • /
    • pp.653-663
    • /
    • 2000
  • A lot of hazardous wastes are discharged as by-products of working process by industrial development. Hazardous wastes is physical characteristics of difficult destruction at hight temperature. Numerical simulation and combustion experiment performed of dump incinerator for hazardous waste incineration. For the numerical simulation, the SIMPLEST algorithm was used to ensure rapid converge A K-$\varepsilon$ model was incorporate for the enclosure of turbulence flow. Combustion model was used by ESCRS (extended simple chemically reacting system) model available of CHEMKIN thermodynamic data for the source term of species conservation equation or energy equation. Radiation model is used by six flux model. A parametric screening studies was carried out through numerical simulation and experiment. Residence time and concentration in the incinerator was strongly dependent on the parameters of mixture velocity, mixture equilibrium ratio, surrogate velocity and surrogate equilibrium ratio.

  • PDF

Nonlinear Analysis Method by the Arc Length Method (Arc Length Method에 의한 비선형 문제의 해법)

  • 이대희;최종근
    • Computational Structural Engineering
    • /
    • v.9 no.3
    • /
    • pp.107-114
    • /
    • 1996
  • The performance for the algorithm of the arc length method has been examined in terms of the choice of the tangential stiffness matrix through the analysis for the snap buckling phenomenon of the arch beam. The curved beam element with 2 nodes including shear effect has been formed by strain element technique and then it has been used in this nonlinear analysis. Snap-through characteristics has been examined with respect to the ratios of the arch beam length to hight.

  • PDF