• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.025 seconds

Design of Error Location Searching Circuit for Reed-Solomon Codes (Reed-Solomon 부호의 오류위치 탐지회로 설계)

  • 조용석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.4
    • /
    • pp.133-140
    • /
    • 1997
  • 본 논문에서는 Reed-Solomon부호의 복호에서 오류위치를 찾는 방법을 제안하고 그 회로를 설계한다. 제안된 오류위치 탐지법을 사용하면, Reed-Solomon복호에서 가장 복잡하고 지연이 많이 걸리는 역원기를 생략할 수 있다. 따라서 기존의 복호기보다 훨씬 간단하고 고속으로 동작하는 Reed-Solomon복호기를 설계할 수 있다.

Design of key Distribution Protocol with Mutual Authenticationi for Mobile Communication Environments (이동통신환경에 적합한 상호 인증을 제공하는 키분배 프로토콜의 설계)

  • 조동욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.2
    • /
    • pp.21-30
    • /
    • 2000
  • 본 논문에서는 이동통신환경의 특징과 기존의 키분배 프로토콜들에서 발생할 수 있는 공격들을 프로토콜 수행전 수행중, 수행후로 나누어서 살펴보고 이를 기반으로 이동통신환경에 적합한 키분배 프로토콜 설계에 필요한 요구사항 들을 제시한다 또한 제시된 요구사항을 기반으로 이동통신환경에 적합한 상호인증을 제공하는 키분배 프로토콜을 제안하고 제안한 프로토콜을 분석한다.

Bit-sliced Modular Multiplication Algorithm and Implementation (비트 확장성을 갖는 모듈러 곱셈 알고리즘 및 모듈러 곱셈기 설계)

  • 류동렬
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.3
    • /
    • pp.3-10
    • /
    • 2000
  • In this paper we propose a bit-sliced modular multiplication algorithm and a bit-sliced modular multiplier design meeting the increasing crypto-key size for RSA public key cryptosystem. The proposed bit-sliced modular multiplication algorithm was designed by modifying the Montgomery's algorithm. The bit-sliced modular multiplier is easy to expand to process large size operands and can be immediately applied to RSA public key cryptosystem.

Wideband Rectangular Planar Monopole Antenna for OAM Wave Generation

  • Qasem, Nidal;Alamayreh, Ahmad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.55-59
    • /
    • 2021
  • Generating electromagnetic waves with Orbital Angular Momentum (OAM) properties is a fast-growing research subject in both radio and optics. This paper describes the generation of OAM carrying waves using a circular array of rectangular planar monopole antennas. The proposed design combines simplicity, compactness, and most importantly very wideband of operating frequencies (about 20-160 GHz, bandwidth ratio about 1:8) which makes it suitable for future applications.

Generic Multidimensional Model of Complex Data: Design and Implementation

  • Khrouf, Kais;Turki, Hela
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.643-647
    • /
    • 2021
  • The use of data analysis on large volumes of data constitutes a challenge for deducting knowledge and new information. Data can be heterogeneous and complex: Semi-structured data (Example: XML), Data from social networks (Example: Tweets) and Factual data (Example: Spreading of Covid-19). In this paper, we propose a generic multidimensional model in order to analyze complex data, according to several dimensions.

Personalization of Document Warehouses: Formalization, Design and Implementation

  • Khrouf, Kais;Turki, Hela
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.369-373
    • /
    • 2022
  • In the decision-making domain, a document warehouse is designed to meet the analysis needs of users who may have a wide variety of analysis purposes. In this paper, we propose to integrate the preferences and interactions of users based on profiles to the concept of document warehouses. These profiles guarantee the integration of personalized documents and the collaborative recommendation of documents between different users sharing common interests.

Design of Fuzzing Status Judgment Function for One-way Protocol Software Fuzzing (단방향 프로토콜 소프트웨어 퍼징을 제공하기 위한 퍼징 상태 판단 기능 설계)

  • An, Gae-Il;Choi, Yang-Seo
    • Annual Conference of KIPS
    • /
    • 2020.11a
    • /
    • pp.374-375
    • /
    • 2020
  • 소프트웨어 보안 취약점을 찾는 기술로서 퍼징(Fuzzing)이 있다. 기존 퍼징 기술은 요구-응답형 프로토콜을 사용하는 소프트웨어를 대상으로 하기 때문에 응답 메시기가 없는 단방향 프로토콜에서는 퍼징을 수행할 수 없는 문제가 있다. 본 논문에서는 단방향 프로토콜 소프트웨어에서 퍼징을 수행하는데 필요한 퍼징 상태 판다 기능을 정의하고 설계한다.

The Performance Analysis of CPU scheduling Algorithms in Operating Systems

  • Thangakumar Jeyaprakash;Ranjana P;Sambath M
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.165-170
    • /
    • 2023
  • Scheduling algorithms plays a significant role in optimizing the CPU in operating system. Each scheduling algorithms schedules the processes in the ready queue with its own algorithm design and its properties. In this paper, the performance analysis of First come First serve scheduling, Non preemptive scheduling, Preemptive scheduling, Shortest Job scheduling and Round Robin algorithm has been discussed with an example and the results has been analyzed with the performance parameters such as minimum waiting time, minimum turnaround time and Response time.

Clustering Algorithms for Reducing Energy Consumption - A Review

  • Kinza Mubasher;Rahat Mansha
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.109-118
    • /
    • 2023
  • Energy awareness is an essential design flaw in wireless sensor network. Clustering is the most highly regarded energy-efficient technique that offers various benefits such as energy efficiency and network lifetime. Clusters create hierarchical WSNs that introduce the efficient use of limited sensor node resources and thus enhance the life of the network. The goal of this paper is to provide an analysis of the various energy efficient clustering algorithms. Analysis is based on the energy efficiency and network lifetime. This review paper provides an analysis of different energy-efficient clustering algorithms for WSNs.

Design and implementation of an improved MA-APUF with higher uniqueness and security

  • Li, Bing;Chen, Shuai;Dan, Fukui
    • ETRI Journal
    • /
    • v.42 no.2
    • /
    • pp.205-216
    • /
    • 2020
  • An arbiter physical unclonable function (APUF) has exponential challenge-response pairs and is easy to implement on field-programmable gate arrays (FPGAs). However, modeling attacks based on machine learning have become a serious threat to APUFs. Although the modeling-attack resistance of an MA-APUF has been improved considerably by architecture modifications, the response generation method of an MA-APUF results in low uniqueness. In this study, we demonstrate three design problems regarding the low uniqueness that APUF-based strong PUFs may exhibit, and we present several foundational principles to improve the uniqueness of APUF-based strong PUFs. In particular, an improved MA-APUF design is implemented in an FPGA and evaluated using a well-established experimental setup. Two types of evaluation metrics are used for evaluation and comparison. Furthermore, evolution strategies, logistic regression, and K-junta functions are used to evaluate the security of our design. The experiment results reveal that the uniqueness of our improved MA-APUF is 81.29% (compared with that of the MA-APUF, 13.12%), and the prediction rate is approximately 56% (compared with that of the MA-APUF (60%-80%).