• Title/Summary/Keyword: Key block analysis method

Search Result 59, Processing Time 0.025 seconds

Differential Fault Analysis on AES by Recovering of Intermediate Ciphertext (중간 암호문 복구 방법을 이용한 AES 차분오류공격)

  • Baek, Yi-Roo;Gil, Kwang-Eun;Park, Jea-Hoon;Moon, Sang-Jae;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.167-174
    • /
    • 2009
  • Recently, Li et al. proposed a new differential fault analysis(DFA) attack on the block cipher ARIA using about 45 ciphertexts. In this paper, we apply their DFA skill on AES and improve attack method and its analysis. The basic idea of our DFA method is that we recover intermediate ciphertexts in last round using final faulty ciphertexts and find out last round secret key. In addition, we present detail DFA procedure on AES and analysis of complexity. Furthermore computer simulation result shows that we can recover its 128-bit secret key by introducing a correct ciphertext and 2 faulty ciphertexts.

A study for the performance evaluation of concrete block assembly wall without using mortar (무모르타르로 건식조립된 콘크리트블록 벽체의 성능평가 연구)

  • Lee, Joong-Won
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.7
    • /
    • pp.203-210
    • /
    • 2019
  • A recent earthquake on the Korean Peninsula caused much damage to masonry buildings, and research on performance evaluation has been underway. A masonry building is generally constructed using wet construction and is affected by temperature, which reduces the efficiency of the construction. In this study, we propose a dry construction technique for assembling concrete blocks without using mortar and evaluated its performance through experimental and analytical research. To evaluate the performance, experiments were carried out for the prismatic compressive strength, direct terminal strength, and diagonal tensile strength of the dry construction wall. The adequacy of the cross section shape was also reviewed through FEM analysis. The results show that the compressive strength and diagonal tensile strength could exert a certain intensity or higher. Furthermore, the H-type module of a key block acted as a shear key for the entire concrete block, which resulted in excellent shear strength performance. In addition, the shape and thickness of the main block have a major effect on the strength performance of each block. Therefore, an optimal shape and the proposed dry construction method could be applied to replace the wet method by studying the construction or seismic performance of the proposed method.

A New Type of Differential Fault Analysis on DES Algorithm (DES 알고리즘에 대한 새로운 차분오류주입공격 방법)

  • So, Hyun-Dong;Kim, Sung-Kyoung;Hong, Seok-Hie;Kang, Eun-Sook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.3-13
    • /
    • 2010
  • Differential Fault Analysis (DFA) is widely known for one of the most efficient method analyzing block cipher. In this paper, we propose a new type of DFA on DES (Data Encryption Standard). DFA on DES was first introduced by Biham and Shamir, then Rivain recently introduced DFA on DES middle rounds (9-12 round). However previous attacks on DES can only be applied to the encryption process. Meanwhile, we first propose the DFA on DES key-schedule. In this paper, we proposed a more efficient DFA on DES key schedule with random fault. The proposed DFA method retrieves the key using a more practical fault model and requires fewer faults than the previous DFA on DES.

Implementation of functional expansion tally method and order selection strategy in Monte Carlo code RMC

  • Wang, Zhenyu;Liu, Shichang;She, Ding;Su, Yang;Chen, Yixue
    • Nuclear Engineering and Technology
    • /
    • v.53 no.2
    • /
    • pp.430-438
    • /
    • 2021
  • The spatial distribution of neutron flux or reaction rate was calculated by cell or mesh tally in traditional Monte Carlo simulation. However, either cell or mesh tally leads to the increase of memory consumption and simulation time. In this paper, the function expansion tally (FET) method was developed in Reactor Monte Carlo code RMC to solve this problem. The FET method was applied to the tallies of neutron flux distributions of uranium block and PWR fuel rod models. Legendre polynomials were used in the axial direction, while Zernike polynomials were used in the radial direction. The results of flux, calculation time and memory consumption of different expansion orders were investigated, and compared with the mesh tally. Results showed that the continuous distribution of flux can be obtained by FET method. The flux distributions were consistent with that of mesh tally, while the memory consumption and simulation time can be effectively reduced. Finally, the convergence analysis of coefficients of polynomials were performed, and the selection strategy of FET order was proposed based on the statistics uncertainty of the coefficients. The proposed method can help to determine the order of FET, which was meaningful for the efficiency and accuracy of FET method.

A Method to Find the Core Node Engaged in Malware Propagation in the Malware Distribution Network Hidden in the Web (웹에 숨겨진 악성코드 배포 네트워크에서 악성코드 전파 핵심노드를 찾는 방안)

  • Kim Sung Jin
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.3-10
    • /
    • 2023
  • In the malware distribution network existing on the web, there is a central node that plays a key role in distributing malware. If you find and block this node, you can effectively block the propagation of malware. In this study, a centrality search method applied with risk analysis in a complex network is proposed, and a method for finding a core node in a malware distribution network is introduced through this approach. In addition, there is a big difference between a benign network and a malicious network in terms of in-degree and out-degree, and also in terms of network layout. Through these characteristics, we can discriminate between malicious and benign networks.

A Double Helix DNA Structure Based on the Block Circulant Matrix (I) (블록순환 행렬에 의한 이중나선 DNA 구조 (I))

  • Lee, Sung-Kook;Park, Ju-Yong;Lee, Moon-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.3
    • /
    • pp.203-211
    • /
    • 2016
  • The genetic code is a key to bio-informatics and to a science of biological self-organizing on the whole. Modern science faces the necessity of understanding and systematically explaining mysterious features of ensembles of molecular structures of the genetic code. This paper is devoted to symmetrical analysis for genetic systems. Mathematical theories of noise-immunity coding and discrete signal processing are based on Jacket matrix methods of representation and analysis of information. Both of the RNA and Jacket Matrix property also have the Element(Block) - wise Inverse Matrices. These matrix methods, which are connected closely with relations of symmetry, are borrowed for a matrix analysis of ensembles of molecular elements of the genetic code. This method is presented for its simplicity and the clarity with which it decomposes a Jacket Matrix in terms of the genetic RNA Codon.

The Analysis of Cipher Padding Problem for Message Recovery Security Function of Honey Encryption (허니암호의 메시지 복구보안 기능을 위한 암호패딩 문제점 분석)

  • Ji, Changhwan;Yoon, Jiwon
    • Journal of KIISE
    • /
    • v.44 no.6
    • /
    • pp.637-642
    • /
    • 2017
  • Honey Encryption (HE) is a technique to overcome the weakness of a brute-force attack of the existing password-based encryption (PBE). By outputting a plausible plaintext even if the wrong key is entered, it provides message recovery security which an attacker can tolerate even if the attacker tries a brute-force attack against a small entropy secret key. However, application of a cipher that requires encryption padding to the HE present a bigger problem than the conventional PBE method. In this paper, we apply a typical block cipher (AES-128) and a stream cipher (A5 / 1) to verify the problem of padding through the analysis of the sentence frequency and we propose a safe operation method of the HE.

A Secure Decentralized Storage Scheme of Private Information in Blockchain Environments

  • Han, Seungjin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.1
    • /
    • pp.111-116
    • /
    • 2018
  • Recently, IoT and Big Data dealing with voluminous and complex sensitive information is one of the key issues in the era of the 4th industrial revolution. There have been a lot of studies to store the collected and processed sensitive information safely in storage data. Especially biometric information, if it is leaked and becomes identity theft, is hard to be corrected and results in serious event. To fix the problem, methods such as FIDO or KFTC have been proposed. In this paper, we propose a modified method of TTAK.KO-12.0098 according to the environment of this paper and propose a method of safely storing the generated disposable template in a block chain. We show that our method is better by comparing the existing method and the security analysis.

Disparity Vector Derivation Method for Texture-Video-First-Coding Modes of 3D Video Coding Standards (3차원 동영상 압축 표준의 텍스쳐 비디오 우선 부호화 방식을 위한 변위 벡터 추정 기법)

  • Kang, Je-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.2080-2089
    • /
    • 2015
  • In 3D video compression, a disparity vector (DV) pointing a corresponding block position in an adjacent view is a key coding tool to exploit statistical correlation in multi-view videos. In this paper, neighboring block-based disparity vector (NBDV) is shown with detail algorithm descriptions and coding performance analysis. The proposed method derives a DV from disparity motion vector information, obtained from spatially and temporally neighboring blocks, and provides a significant coding gain about 20% BD-rate saving in a texture-video-first-coding scheme. The proposed DV derivation method is adopted into the recent 3D video coding standards such as 3D-AVC and 3D-HEVC as the state-of-the-art DV derivation method.

Numerical Simulation of Interactions between Corrosion Pits on Stainless Steel under Loading Conditions

  • Wang, Haitao;Han, En-Hou
    • Corrosion Science and Technology
    • /
    • v.16 no.2
    • /
    • pp.64-68
    • /
    • 2017
  • The interactions between corrosion pits on stainless steel under loading conditions are studied by using a cellular automata model coupled with finite element method at a mesoscopic scale. The cellular automata model focuses on a metal/film/electrolyte system, including anodic dissolution, passivation, diffusion of hydrogen ions and salt film hydrolysis. The Chopard block algorithm is used to improve the diffusion simulation efficiency. The finite element method is used to calculate the stress concentration on the pit surface during pit growth, and the effect of local stress and strain on anodic current is obtained by using the Gutman model, which is used as the boundary conditions of the cellular automata model. The transient current characteristics of the interactions between corrosion pits under different simulation factors including the breakdown of the passive film at the pit mouth and the diffusion of hydrogen ions are analyzed. The analysis of the pit stability product shows that the simulation results are close to the experimental conclusions.