• Title/Summary/Keyword: Integral Attack

Search Result 20, Processing Time 0.025 seconds

MILP-Aided Division Property and Integral Attack on Lightweight Block Cipher PIPO (경량 블록 암호 PIPO의 MILP-Aided 디비전 프로퍼티 분석 및 인테그랄 공격)

  • Kim, Jeseong;Kim, Seonggyeom;Kim, Sunyeop;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.875-888
    • /
    • 2021
  • In this paper, we search integral distinguishers of lightweight block cipher PIPO and propose a key recovery attack on 8-round PIPO-64/128 with the obtained 6-round distinguishers. The lightweight block cipher PIPO proposed in ICISC 2020 is designed to provide the efficient implementation of high-order masking for side-channel attack resistance. In the proposal, various attacks such as differential and linear cryptanalyses were applied to show the sufficient security strength. However, the designers leave integral attack to be conducted and only show that it is unlikely for PIPO to have integral distinguishers longer than 5-round PIPO without further analysis on Division Property. In this paper, we search integral distinguishers of PIPO using a MILP-aided Division Property search method. Our search can show that there exist 6-round integral distinguishers, which is different from what the designers insist. We also consider linear operation on input and output of distinguisher, respectively, and manage to obtain totally 136 6-round integral distinguishers. Finally, we present an 8-round PIPO-64/128 key recovery attack with time complexity 2124.5849 and memory complexity of 293 with four 6-round integral distinguishers among the entire obtained distinguishers.

Security Analysis on GFN with Secret S-box (비밀 S-box를 사용한 GFN에 대한 안전성 분석)

  • Lee, Yongseong;Kang, HyungChul;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.467-476
    • /
    • 2017
  • In this paper, we analyze Generalized Feistel Network(GFN) Type I, Type II, Type III that round function use SP update function, secret S-box and $k{\times}k$ MDS matirx. In this case an attacker has no advantage about S-box. For each type of GFN, we analyze and restore secret S-box in 9, 6, 6 round using the basis of integral cryptanalysis with chosen plaintext attack. Also we restore secret S-box in 16 round of GFN Type I with chosen ciphertext attack. In conclusion, we need $2^{2m}$ data complexity and ${\frac{2^{3m}}{32k}},{\frac{2^{3m}}{24k}},{\frac{2^{3m}}{36k}}$ time complexity to restore m bit secret S-box in GFN Type I, Type II, Type III.

Performance Comparison of 3-D Optimal Evasion against PN Guided Defense Missiles Using SQP and CEALM Optimization Methods (SQP와 CEALM 최적화 기법에 의한 대공 방어 유도탄에 대한 3차원 최적 회피 성능 비교)

  • Cho, Sung-Bong;Ryoo, Chang-Kyung;Tahk, Min-Jea
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.3
    • /
    • pp.272-281
    • /
    • 2009
  • In this paper, three-dimensional optimal evasive maneuver patterns for air-to-surface attack missiles against proportionally navigated anti-air defense missiles were investigated. An interception error of the defense missile is produced by an evasive maneuver of the attack missile. It is assumed that the defense missiles are continuously launched during the flight of attack missile. The performance index to be minimized is then defined as the negative square integral of the interception errors. The direct parameter optimization technique based on SQP and a co-evolution method based on the augmented Lagrangian formulation are adopted to get the attack missile's optimal evasive maneuver patterns. The overall shape of the resultant optimal evasive maneuver is represented as a deformed barrel-roll.

Remaining service life estimation of reinforced concrete buildings based on fuzzy approach

  • Cho, Hae-Chang;Lee, Deuck Hang;Ju, Hyunjin;Kim, Kang Su;Kim, Ki-Hyun;Monteiro, Paulo J.M.
    • Computers and Concrete
    • /
    • v.15 no.6
    • /
    • pp.879-902
    • /
    • 2015
  • The remaining service life (RSL) of buildings has been an important issue in the field of building and facility management, and its development is also one of the essential factors for achieving sustainable infrastructure. Since the estimation of RSL of buildings is heavily affected by the subjectivity of individual inspector or engineer, much effort has been placed in the development of a rational method that can estimate the RSL of existing buildings more quantitatively using objective measurement indices. Various uncertain factors contribute to the deterioration of the structural performance of buildings, and most of the common building structures are constructed not with a single structural member but with various types of structural components (e.g., beams, slabs, and columns) in multistory floors. Most existing RSL estimation methods, however, consider only an individual factor. In this study, an estimation method for RSL of concrete buildings is presented by utilizing a fuzzy theory to consider the effects of multiple influencing factors on the deterioration of durability (e.g., concrete carbonation, chloride attack, sulfate attack), as well as the current structural condition (or damage level) of buildings.

A Study on Longitudinal Phugoid Mode Affected by Application of Nonlinear Control Laws

  • Kim, Chong-Sup;Hur, Gi-Bong;Kim, Seung-Jun
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.8 no.1
    • /
    • pp.21-31
    • /
    • 2007
  • Relaxed Static Stability (RSS) concept has been applied to improve aerodynamic performance of modern version supersonic jet fighter aircraft. The T-50 advanced supersonic trainer employs the RSS concept in order to improve the aerodynamic performance. And the flight control system stabilizes the unstable aircraft and provides adequate handling qualities. The T-50 longitudinal control laws employ a proportional-plus-integral type controller based on a dynamic inversion method. The longitudinal dynamic modes consist of short period with high frequency and phugoid mode with low frequency. The design goal of longitudinal control law is optimization of short period damping ratio and frequency using Lower Order Equivalent System (LOES) complying the requirement of MIL-F-8785C. This paper addresses phugoid mode characteristics such as damping ratio and natural frequency that is affected by the nonlinear control laws such as angle of attack limiter, auto pitch attitude command system and autopilot of pitch attitude hold.

FUZZY CONTROL LAW OF HIGHLY MANEUVERABLE HIGH PERFORMANCE AIRCRAFT

  • Sul Cho;Park, Rai-Woong;Nam, Sae-Kyu;Lee, Man-Hyung
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1998.10a
    • /
    • pp.205-209
    • /
    • 1998
  • A synthesis of fuzzy variable structure control is proposed to design a high-angle-of-attack flight system for a modification version of the F-18 aircraft. The knowledge of the proportional, integral, and derivative control is combined into the fuzzy control that addresses both the highly nonlinear aerodynamic characteristics of elevators and the control limit of thrust vectoring nozzles. A simple gain scheduling method with multi-layered fuzzy rules is adopted to obtain an appropriate blend of elevator and thrust vectoring commands in the wide operating range. Improving the computational efficiency, an accelerated kernel for on-line fuzzy reasoning is also proposed. The resulting control system achieves the good flying quantities during a high-angle-of- attack excursion. Thus the fuzzy logic can afford the control engineer a flexible means of deriving effective control laws in the nonlinear flight regime.

  • PDF

A DDoS attack Mitigation in IoT Communications Using Machine Learning

  • Hailye Tekleselase
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.170-178
    • /
    • 2024
  • Through the growth of the fifth-generation networks and artificial intelligence technologies, new threats and challenges have appeared to wireless communication system, especially in cybersecurity. And IoT networks are gradually attractive stages for introduction of DDoS attacks due to integral frailer security and resource-constrained nature of IoT devices. This paper emphases on detecting DDoS attack in wireless networks by categorizing inward network packets on the transport layer as either "abnormal" or "normal" using the integration of machine learning algorithms knowledge-based system. In this paper, deep learning algorithms and CNN were autonomously trained for mitigating DDoS attacks. This paper lays importance on misuse based DDOS attacks which comprise TCP SYN-Flood and ICMP flood. The researcher uses CICIDS2017 and NSL-KDD dataset in training and testing the algorithms (model) while the experimentation phase. accuracy score is used to measure the classification performance of the four algorithms. the results display that the 99.93 performance is recorded.

An Improved Pseudorandom Sequence Generator and its Application to Image Encryption

  • Sinha, Keshav;Paul, Partha;Amritanjali, Amritanjali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.4
    • /
    • pp.1307-1329
    • /
    • 2022
  • This paper proposes an improved Pseudorandom Sequence Generator (PRSG) based on the concept of modular arithmetic systems with non-integral numbers. The generated random sequence use in various cryptographic applications due to its unpredictability. Here the mathematical model is designed to solve the problem of the non-uniform distribution of the sequences. In addition, PRSG has passed the standard statistical and empirical tests, which shows that the proposed generator has good statistical characteristics. Finally, image encryption has been performed based on the sort-index method and diffusion processing to obtain the encrypted image. After a thorough evaluation of encryption performance, there has been no direct association between the original and encrypted images. The results show that the proposed PRSG has good statistical characteristics and security performance in cryptographic applications.

A Study of Web Application Attack Detection extended ESM Agent (통합보안관리 에이전트를 확장한 웹 어플리케이션 공격 탐지 연구)

  • Kim, Sung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.161-168
    • /
    • 2007
  • Web attack uses structural, logical and coding error or web application rather than vulnerability to Web server itself. According to the Open Web Application Security Project (OWASP) published about ten types of the web application vulnerability to show the causes of hacking, the risk of hacking and the severity of damage are well known. The detection ability and response is important to deal with web hacking. Filtering methods like pattern matching and code modification are used for defense but these methods can not detect new types of attacks. Also though the security unit product like IDS or web application firewall can be used, these require a lot of money and efforts to operate and maintain, and security unit product is likely to generate false positive detection. In this research profiling method that attracts the structure of web application and the attributes of input parameters such as types and length is used, and by installing structural database of web application in advance it is possible that the lack of the validation of user input value check and the verification and attack detection is solved through using profiling identifier of database against illegal request. Integral security management system has been used in most institutes. Therefore even if additional unit security product is not applied, attacks against the web application will be able to be detected by showing the model, which the security monitoring log gathering agent of the integral security management system and the function of the detection of web application attack are combined.

  • PDF

Development of Flight Control Laws for the T-50 Advanced Supersonic Jet Trainer

  • Kim, Chong-Sup;Hur, Gi-Bong;Hwang, Byung-Moon;Cho, In-Je;Kim, Seung-Jun
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.8 no.1
    • /
    • pp.32-45
    • /
    • 2007
  • The T-50 advanced supersonic jet trainer employs the Relaxed Static Stability (RSS) concept to improve the aerodynamic performance while the flight control system stabilizes the unstable aircraft and provides adequate handling qualities. The T-50 flight control laws employ a proportional-plus-integral type controller based on a dynamic inversion method in longitudinal axis and a proportional type controller based on a blended roll system with simple roll rate feedback and beta-betadot feedback system. These control laws are verified by flight tests with various maneuver set flight envelopes and the control laws are updated to resolve flight test issues. This paper describes several concepts of flight control laws used in T-50 to resolve those flight test issues. Control laws for solving the roll-off problem during pitch maneuver in asymmetric loading configurations, improving the departure resistance in negative angle of attack conditions and enhancing the fine tracking performance in air-to-air tracking maneuvers are described with flight test data.