• Title/Summary/Keyword: Lattice attack

Search Result 31, Processing Time 0.022 seconds

Meta-Modeling to Detect Attack Behavior for Security (보안을 위한 공격 행위 감지 메타-모델링)

  • On, Jinho;Choe, Yeongbok;Lee, Moonkun
    • Journal of KIISE
    • /
    • v.41 no.12
    • /
    • pp.1035-1049
    • /
    • 2014
  • This paper presents a new method to detect attack patterns in security-critical systems, based on a new notion of Behavior Ontology. Generally security-critical systems are large and complex, and they are subject to be attacked in every possible way. Therefore it is very complicated to detect various attacks through a semantic structure designed to detect such attacks. This paper handles the complication with Behavior Ontology, where patterns of attacks in the systems are defined as a sequences of actions on the class ontology of the systems. We define the patterns of attacks as sequences of actions, and the attack patterns can then be abstracted in a hierarchical order, forming a lattice, based on the inclusion relations. Once the behavior ontology for the attack patterns is defined, the attacks in the target systems can be detected both semantically and hierarchically in the ontology structure. When compared to other attack models, the behavior ontology analysis proposed in this paper is found to be very effective and efficient in terms of time and space.

A Study of SPA Vulnerability on 8-bit Implementation of Ring-LWE Cryptosystem (8 비트 구현 Ring-LWE 암호시스템의 SPA 취약점 연구)

  • Park, Aesun;Won, Yoo-Seung;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.439-448
    • /
    • 2017
  • It is news from nowhere that post-quantum cryptography has side-channel analysis vulnerability. Side-channel analysis attack method and countermeasures for code-based McEliece cryptosystem and lattice-based NTRU cryptosystem have been investigated. Unfortunately, the investigation of the ring-LWE cryptosystem in terms of side-channel analysis is as yet insufficient. In this paper, we propose a chosen ciphertext simple power analysis attack that can be applied when ring-LWE cryptography operates on 8-bit devices. Our proposed attack can recover the key only with [$log_2q$] traces. q is a parameter related to the security level. It is used 7681 and 12289 to match the common 128 and 256-bit security levels, respectively. We identify the vulnerability through experiment that can reveal the secret key in modular add while the ring-LWE decryption performed on real 8-bit devices. We also discuss the attack that uses a similarity measurement method for two vectors to reduce attack time.

Assessment of vertical wind loads on lattice framework with application to thunderstorm winds

  • Mara, T.G.;Galsworthy, J.K.;Savory, E.
    • Wind and Structures
    • /
    • v.13 no.5
    • /
    • pp.413-431
    • /
    • 2010
  • The focus of this article is on the assessment of vertical wind vector components and their aerodynamic impact on lattice framework, specifically two distinct sections of a guyed transmission tower. Thunderstorm winds, notably very localized events such as convective downdrafts (including downbursts) and tornadoes, result in a different load on a tower's structural system in terms of magnitude and spatial distribution when compared to horizontal synoptic winds. Findings of previous model-scale experiments are outlined and their results considered for the development of a testing rig that allows for rotation about multiple body axes through a series of wind tunnel tests. Experimental results for the wind loads on two unique experimental models are presented and the difference in behaviour discussed. For a model cross arm with a solidity ratio of approximately 30%, the drag load was increased by 14% when at a pitch angle of $20^{\circ}$. Although the effects of rotation about the vertical body axis, or the traditional 'angle of attack', are recognized by design codes as being significant, provisions for vertical winds are absent from each set of wind loading specifications examined. The inclusion of a factor to relate winds with a vertical component to the horizontal speed is evaluated as a vertical wind factor applicable to load calculations. Member complexity and asymmetric geometry often complicate the use of lattice wind loading provisions, which is a challenge that extends to future studies and codification. Nevertheless, the present work is intended to establish a basis for such studies.

Montgomery Multiplier with Very Regular Behavior

  • Yoo-Jin Baek
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.17-28
    • /
    • 2024
  • As listed as one of the most important requirements for Post-Quantum Cryptography standardization process by National Institute of Standards and Technology, the resistance to various side-channel attacks is considered very critical in deploying cryptosystems in practice. In fact, cryptosystems can easily be broken by side-channel attacks, even though they are considered to be secure in the mathematical point of view. The timing attack(TA) and the simple power analysis attack(SPA) are such side-channel attack methods which can reveal sensitive information by analyzing the timing behavior or the power consumption pattern of cryptographic operations. Thus, appropriate measures against such attacks must carefully be considered in the early stage of cryptosystem's implementation process. The Montgomery multiplier is a commonly used and classical gadget in implementing big-number-based cryptosystems including RSA and ECC. And, as recently proposed as an alternative of building blocks for implementing post quantum cryptography such as lattice-based cryptography, the big-number multiplier including the Montgomery multiplier still plays a role in modern cryptography. However, in spite of its effectiveness and wide-adoption, the multiplier is known to be vulnerable to TA and SPA. And this paper proposes a new countermeasure for the Montgomery multiplier against TA and SPA. Briefly speaking, the new measure first represents a multiplication operand without 0 digits, so the resulting multiplication operation behaves in a very regular manner. Also, the new algorithm removes the extra final reduction (which is intrinsic to the modular multiplication) to make the resulting multiplier more timing-independent. Consequently, the resulting multiplier operates in constant time so that it totally removes any TA and SPA vulnerabilities. Since the proposed method can process multi bits at a time, implementers can also trade-off the performance with the resource usage to get desirable implementation characteristics.

The Effects of Acid Treatment of Bentonite on Its Crystal Structure (산처리 과정에 따른 벤토나이트의 결정구조 변화)

  • Yoon, Soh-Joung;Moon, Hi-Soo
    • Economic and Environmental Geology
    • /
    • v.27 no.6
    • /
    • pp.507-521
    • /
    • 1994
  • Bentonite occurs in the Janggi Conglomerate of Tertiary age and consists mainly of montmorillonite with Mg as predominant interlayer cations. The bentonite was reacted with various concentrations of sulfuric acid (0.8~1.5M) for various reaction time (1-10h) at $103^{\circ}C$. Cation exchange capacity, exchangeable cations, surface area and solid acidity of the original bulk and acid activated bentonites were measured. Chemical analysis, X-ray diffraction, differential thermal analysis and infrared spectroscopy were used to characterize the changes in structure and properties of the acid activated bentonite. The dissolution of octahedral cations occurs not only from the edge of the clay platelets but also throughout the whole clay structure creating vacant octahedral sites. These lattice defects are created by $H^+$ diffused into the smectite layers. The cations leached possibly from the octahedral sheets are adsorbed on the interlayer exchange sites. They are exchanged with hydronium ions again by stronger acid attack. These reactions create wedge-shaped pores resulting in the increase of the surface area and the changes the morphology in the lattice structure.

  • PDF

Unsteady Aerodynimic Analysis of an Aircraft Using a Frequency Domain 3-D Panel Method (주파수영역 3차원 패널법을 이용한 항공기의 비정상 공력해석)

  • 김창희;조진수;염찬홍
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.18 no.7
    • /
    • pp.1808-1817
    • /
    • 1994
  • Unsteady aerodynamic analysis of an aircraft is done using a frequency domian 3-D panel method. The method is based on an unsteady linear compressible lifting surface theory. The lifting surface is placed in a flight patch, and angle of attack and camber effects are implemented in upwash. Fuselage effects are not considered. The unsteady solutions of the code are validated by comparing with the solutions of a hybrid doublet lattice-doublet point method and a doublet point method for various wing configurations at subsonic and supersonic flow conditions. The calculated results of dynamic stability derivatives for aircraft are shown without comparision due to lack of available measured data or calculated results.

Aerodynamic Noise Analysis of High Speed Wind Turbine System for Design Parameters of the Rotor Blade (고속 회전 풍력 시스템의 로터 설계 인자에 따른 공력 소음 해석 연구)

  • Lee, Seung-Min;Kim, Ho-Geon;Son, Eun-Kuk;Lee, Soo-Gab
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2009.06a
    • /
    • pp.521-524
    • /
    • 2009
  • This study describes aerodynamic noise of high speed wind turbine system, which is invented as a new concept in order to reduce the torque of main shaft, for design parameters of the rotor blade. For parametric study of high speed rotor aerodynamic noise, Unsteady Vortex Lattice Method with Nonlinear Vortex Correction Method is used for analysis of wind turbine blade aerodynamic and Farassat1A and Semi-Empirical are used for low frequency noise and airfoil self noise. Parameters are chord length, twist and rotational speed for this parametric research. In the low frequency range, the change of noise is predicted the same level as each parameters varies. However, in case of broadband noise of blade, the change of rotational speed makes more variation of noise than other parameters. When the geometric angles of attack are fixed, as the rotational speed is increased by 5RPM, the noise level is increased by 4dB.

  • PDF

Robustness Evaluation of Tactical Network based on SNA

  • Park, Ji-Hye;Yoon, Soung-woong;Lee, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.205-213
    • /
    • 2019
  • Network robustness is one of the most important characteristics needed as the network. Over the military tactical communication network, robustness is a key function for maintaining attack phase constantly. Tactical Information Communication Network, called TICN, has mixed characteristics of lattice- and tree-type network topology, which looks somewhat weak in the viewpoint of network robustness. In this paper, we search articulation points and bridges in a current Tactical Information Communication Network using graph theory. To improve the weak points empirically searched, we try to add links to create the concrete network and then observe the change of network-based verification values through diminishing nodes. With these themes, we evaluate the generated networks through SNA techniques. Experimental results show that the generated networks' robustness is improved compared with current network structure.

Wind-excited stochastic vibration of long-span bridge considering wind field parameters during typhoon landfall

  • Ge, Yaojun;Zhao, Lin
    • Wind and Structures
    • /
    • v.19 no.4
    • /
    • pp.421-441
    • /
    • 2014
  • With the assistance of typhoon field data at aerial elevation level observed by meteorological satellites and wind velocity and direction records nearby the ground gathered in Guangzhou Weather Station between 1985 and 2001, some key wind field parameters under typhoon climate in Guangzhou region were calibrated based on Monte-Carlo stochastic algorithm and Meng's typhoon numerical model. By using Peak Over Threshold method (POT) and Generalized Pareto Distribution (GPD), Wind field characteristics during typhoons for various return periods in several typical engineering fields were predicted, showing that some distribution rules in relation to gradient height of atmosphere boundary layer, power-law component of wind profile, gust factor and extreme wind velocity at 1-3s time interval are obviously different from corresponding items in Chinese wind load Codes. In order to evaluate the influence of typhoon field parameters on long-span flexible bridges, 1:100 reduced-scale wind field of type B terrain was reillustrated under typhoon and normal conditions utilizing passive turbulence generators in TJ-3 wind tunnel, and wind-induced performance tests of aero-elastic model of long-span Guangzhou Xinguang arch bridge were carried out as well. Furthermore, aerodynamic admittance function about lattice cross section in mid-span arch lib under the condition of higher turbulence intensity of typhoon field was identified via using high-frequency force-measured balance. Based on identified aerodynamic admittance expressions, Wind-induced stochastic vibration of Xinguang arch bridge under typhoon and normal climates was calculated and compared, considering structural geometrical non-linearity, stochastic wind attack angle effects, etc. Thus, the aerodynamic response characteristics under typhoon and normal conditions can be illustrated and checked, which are of satisfactory response results for different oncoming wind velocities with resemblance to those wind tunnel testing data under the two types of climate modes.

Experimental study of graphene oxide on wollastonite induced cement mortar

  • Sairam, V.;Shanmugapriya, T.;Jain, Chetan;Agrahari, Himanshu Kumar;Malpani, Tanmay
    • Advances in concrete construction
    • /
    • v.12 no.6
    • /
    • pp.479-490
    • /
    • 2021
  • Present research is mainly focused on, microstructural and durability analysis of Graphene Oxide (GO) in Wollastonite (WO) induced cement mortar with silica fume. The study was conducted by evaluating the mechanical properties (compressive and flexural strength), durability properties (water absorption, sorptivity and sulphate resistance) and microstructural analysis by SEM. Cement mortar mix prepared by replacing 10% ordinary portland cement with SF was considered as the control mix. Wollastonite replacement level varied from 0 to 20% by weight of cement. The optimum replacement of wollastonite was found to be 15% and this was followed by four sets of mortar specimens with varying substitution levels of cementitious material with GO at dosage rates of 0.1%, 0.2%, 0.3% and 0.4% by weight. The results indicated that the addition of up to 15%WO and 0.3% GO improves the hydration process and increase the compressive strength and flexural strength of the mortar due to the pore volume reduction, thereby strengthening the mortar mix. The resistance to water penetration and sulphate attack of mortar mixes were generally improved with the dosage of GO in presence of 15% Wollastonite and 10% silica fume content in the mortar mix. Furthermore, FE-SEM test results showed that the WO influences the lattice framework of the cement hydration products increasing the bonding between silica fume particles and cement. The optimum mix containing 0.3% GO with 15% WO replacement exhibited extensive C-S-H formation along with a uniform densified structure indicating that calcium meta-silicate has filled the pores.