• Title/Summary/Keyword: Key Technology Protection

Search Result 331, Processing Time 0.024 seconds

An Efficient Technique to Protect AES Secret Key from Scan Test Channel Attacks

  • Song, Jae-Hoon;Jung, Tae-Jin;Jung, Ji-Hun;Park, Sung-Ju
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.12 no.3
    • /
    • pp.286-292
    • /
    • 2012
  • Scan techniques are almost mandatorily adopted in designing current System-on-a-Chip (SoC) to enhance testability, but inadvertently secret keys can be stolen through the scan test channels of crypto SoCs. An efficient scan design technique is proposed in this paper to protect the secret key of an Advanced Encryption Standard (AES) core embedded in an SoC. A new instruction is added to IEEE 1149.1 boundary scan to use a fake key instead of user key, in which the fake key is chosen with meticulous care to improve the testability as well. Our approach can be implemented as user defined logic with conventional boundary scan design, hence no modification is necessary to any crypto IP core. Conformance to the IEEE 1149.1 standards is completely preserved while yielding better performance of area, power, and fault coverage with highly robust protection of the secret user key.

Citic Tower Construction Key Technology

  • Xu, Lishan
    • International Journal of High-Rise Buildings
    • /
    • v.8 no.3
    • /
    • pp.185-192
    • /
    • 2019
  • Citic Tower is the first over-500 m-tall super highrise building in the world, located in the high seismic intensity area with paek ground acceleration over 0.2g in 475 years. This project is unique in its complexity, large volume, and challenging site conditions (zero site for construction). The traditional techniques can hardly meet safty, quality and schedule requirements of the construction. This article introduces the key construction technologies that are innovatively developed and applied in Citic Tower project construction, including intelligent super-high-rise building integrated construction platform system, independently developed by the CCTEB; Jump-Lift Elevator, which is the first of the kind with service height over 500 meters; combined temporary-and-permanent fire protection systems. The BIM technology is also applied in this project. Through technical innovation, and utilization of technologies, construction speed and safety had been greatly improved.

Investigation of Design Methodology for Impressed Current Cathodic Protection Optimum System

  • Yao, Ping;Wu, Jianhua
    • Corrosion Science and Technology
    • /
    • v.7 no.4
    • /
    • pp.197-200
    • /
    • 2008
  • In this paper, physical scale modeling was employed to identify the configurations of ICCP system and the electric field signatures. Computational boundary element modeling technique has been used to simulate the performance of the CP system and to predict the associated electric fields signatures. The optimization methods combined with the computer models and physical scale modeling will be presented here, which enable the optimum system design to be achieved both in terms of the location and current output of the anode but also in the location of reference electrodes for impressed current cathodic protection(ICCP) systems. The combined methodology was utilized to determine optimal placement of ICCP components (anodes and reference electrodes) and to evaluate performance of ICCP system for the 2%, 10% and 14% wetted hull coatings loss. The objective is to design the system to minimise the electric field while at the same time provide adequate protection for the ship. The results show that experimental scale modeling and computational modeling techniques can be used in concert to design an optimum ICCP system and to provide information for quickly analysis of the system and its surrounding environment.

A Study on Encrypted Matrix Puzzle for Digital Contents Protection (디지털 컨텐츠 보호를 위한 메트릭스 퍼즐 암호화방법에 대한 연구)

  • Min, So-Yeon;Kim, Jung-Jae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.4
    • /
    • pp.936-944
    • /
    • 2008
  • DRM system is a technology that protects and manages copyright holder's privilege by using a copyright protection technology. This paper contributes to improvement of the secret key transmission and encryption/decryption processing time base on DRM system. In this paper, we will suggest that as follow: First, we will propose the algorithm to transmit the encryption key which use Multidimensional Method more safe than the existing One-path XOR method. Second, we will provide the high quality algorithm of security than the existing system because the Multidimensional which generated from the algorithm does not saved to the server side. Third, we will support the client decryption system which can decrypt the Multidimensional with OPT in decryption with client side. Fourth, we will adopt the more safr method of transmission with the compound of Multidimensional Method and OPT.

Provably secure attribute based signcryption with delegated computation and efficient key updating

  • Hong, Hanshu;Xia, Yunhao;Sun, Zhixin;Liu, Ximeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2646-2659
    • /
    • 2017
  • Equipped with the advantages of flexible access control and fine-grained authentication, attribute based signcryption is diffusely designed for security preservation in many scenarios. However, realizing efficient key evolution and reducing the calculation costs are two challenges which should be given full consideration in attribute based cryptosystem. In this paper, we present a key-policy attribute based signcryption scheme (KP-ABSC) with delegated computation and efficient key updating. In our scheme, an access structure is embedded into user's private key, while ciphertexts corresponds a target attribute set. Only the two are matched can a user decrypt and verify the ciphertexts. When the access privileges have to be altered or key exposure happens, the system will evolve into the next time slice to preserve the forward security. What's more, data receivers can delegate most of the de-signcryption task to data server, which can reduce the calculation on client's side. By performance analysis, our scheme is shown to be secure and more efficient, which makes it a promising method for data protection in data outsourcing systems.

Key-dependent side-channel cube attack on CRAFT

  • Pang, Kok-An;Abdul-Latip, Shekh Faisal
    • ETRI Journal
    • /
    • v.43 no.2
    • /
    • pp.344-356
    • /
    • 2021
  • CRAFT is a tweakable block cipher introduced in 2019 that aims to provide strong protection against differential fault analysis. In this paper, we show that CRAFT is vulnerable to side-channel cube attacks. We apply side-channel cube attacks to CRAFT with the Hamming weight leakage assumption. We found that the first half of the secret key can be recovered from the Hamming weight leakage after the first round. Next, using the recovered key bits, we continue our attack to recover the second half of the secret key. We show that the set of equations that are solvable varies depending on the value of the key bits. Our result shows that 99.90% of the key space can be fully recovered within a practical time.

Nanosecond Laser Cleaning of Aluminum Alloy Oxide Film

  • Hang Dong;Yahui Li;Shanman Lu;Wei Zhang;Guangyong Jin
    • Current Optics and Photonics
    • /
    • v.7 no.6
    • /
    • pp.714-720
    • /
    • 2023
  • Laser cleaning has the advantages of environmental protection, precision, and high efficiency, and has good prospects for application in removing oxide films on the surface of aluminum alloy. This paper discusses the cleaning threshold and cleaning mechanism of aluminum alloy surface oxide film. A nanosecond pulsed laser was used to remove a 5-㎛-thick oxide film from the surface of 7A04 aluminum alloy, and the target surface temperature and cleaning depth were simulated. The effects of different laser energy densities on the surface morphology of the aluminum alloy were analyzed, and the plasma motion process was recorded using a high-speed camera. The temperature measurement results of the experiment are close to the simulation results. The results show that the laser cleaning of aluminum alloy oxide film is mainly based on the vaporization mechanism and the shock wave generated by the explosion.

Reversibility and safety of KISS1 metastasis suppressor gene vaccine in immunocastration of ram lambs

  • Han, Yan-Guo;Liu, Gui-Qiong;Jiang, Xun-Ping;Xiang, Xing-Long;Huang, Yong-Fu;Nie, Bin;Zhao, Jia-Yu;Nabeel, Ijaz;Tesema, Birhanu
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.31 no.6
    • /
    • pp.835-841
    • /
    • 2018
  • Objective: The aim of this study was to investigate the reversibility and safety of KISS1 metastasis suppressor (KISS1) gene vaccine in immunocastration. Methods: Six eight-week old ram lambs were randomly divided into vaccinated and control groups. The vaccine (1 mg/ram lamb) was injected at weeks 0, 3, and 6 of the study. Blood samples were collected from the jugular vein before primary immunization and at weeks 2, 4, 6, 10, 14, 22, and 30 after primary immunization. All ram lambs were slaughtered at 38 weeks of age, and samples were collected. Results: The specific anti-KISS1 antibody titers in vaccinated animals were significantly higher and the serum testosterone level was significantly lower than those in the control groups from week 4 to 14 after primary immunization (p<0.05). No significant difference was observed at weeks 22 and 30 after the primary immunization. Similar results were also found for scrotal circumference, testicular weight, length, breadth, and spermatogenesis in seminiferous tubules in week 30 after primary immunization. KS (KISS1-hepatitis B surface antigen S) fusion fragment of KISS1 gene vaccine was not detected in host cell genomic DNA of 9 tissues of the vaccinated ram lambs by polymerase chain reaction. Conclusion: The effects of KISS1 gene vaccine in immunocastration were reversible and no integration events were recorded.

On Finding the Multicast Protection Tree Considering SRLG in WDM Optical Networks

  • Li, Yonggang;Jin, Yaohui;Li, Lemin;Li, Longjiang
    • ETRI Journal
    • /
    • v.28 no.4
    • /
    • pp.517-520
    • /
    • 2006
  • In this letter, a new sharing mechanism, SRLG sharing, is proposed, which allows the links of the same shared risk link group (SRLG) in a primary light tree to share protections in WDM optical networks. In previous studies, how to share spare resources with SRLG constraints has not been studied in multicast optical networks. In this letter, considering SRLG sharing, we propose a novel algorithm -multicast with SRLG sharing (MSS)- to establish a protection light tree. Finally, the algorithm MSS and the algorithm multicast with no SRLG sharing (MNSS) are compared through a simulation to show that our new sharing scheme of SRLG sharing is more efficient than that of no SRLG sharing in terms of spare resource utilization and blocking probability.

  • PDF

Implementation of key establishment protocol using Signcryption for Secure RTP

  • Kim, Hyung-Chan;Kim, Jong-Won;Lee, Dong-Ik
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10c
    • /
    • pp.439-441
    • /
    • 2002
  • Real-time Transport Protocol (RTP) is widely used in VoIP stacks charging the multimedia data delivery. Concerning with payload protection of RTP packets, Secure RTP has been discussed in IETF AVT group to provide confidentiality and authentication features using block ciphering and message authentication coding. However, Secure RTP only concentrates on payload protection. Signcryption is a good candidate for key agreement. This paper proposes a key establishment protocol using Signcryption and shows example implementation of a secure VoIP application based on Secure RTP with the proposed scheme.

  • PDF