• Title/Summary/Keyword: Single-channel 알고리즘

Search Result 139, Processing Time 0.024 seconds

Side-Channel Attack against Secure Data Deduplication over Encrypted Data in Cloud Storage (암호화된 클라우드 데이터의 중복제거 기법에 대한 부채널 공격)

  • Shin, Hyungjune;Koo, Dongyoung;Hur, Junbeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.971-980
    • /
    • 2017
  • Data deduplication can be utilized to reduce storage space in cloud storage services by storing only a single copy of data rather than all duplicated copies. Users who are concerned the confidentiality of their outsourced data can use secure encryption algorithms, but it makes data deduplication ineffective. In order to reconcile data deduplication with encryption, Liu et al. proposed a new server-side cross-user deduplication scheme by exploiting password authenticated key exchange (PAKE) protocol in 2015. In this paper, we demonstrate that this scheme has side channel which causes insecurity against the confirmation-of-file (CoF), or duplicate identification attack.

IEEE 802.11a Interference Suppression Method Using by SVD Algorithm in LR-UWB Systems (LR-UWB 시스템에서 특이값 분해를 이용한 IEEE 802.11a 간섭억압기법)

  • Kim, Dong-Hee;Kim, Tae-Hun;Jang, Hong-Mo;Park, Ho-Hwan;Kwak, Kyung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.1A
    • /
    • pp.74-84
    • /
    • 2008
  • UWB radio systems have drawn attention during the last few years. These systems are the core technique for ubiquitous home and enable to co-exist with other narrow band systems over the same frequency without interfering them. But UWB signals have a very low power per pulse, so they are affected by strong narrow band interferences. Specially, IEEE 802.11a systems which operate around 5GHz overlap the band of UWB signals and they will interfere with UWB systems significantly. In this paper, we propose a novel narrow band interference suppression method based on singular value decomposition(SVD) algorithm for DS-UWB in IEEE 802.15.4a channel model. The proposed method is very effective and robust for both a single user DS-UWB system and a multiuser DS-UWB system to reduce the narrow band interference.

Power Analysis Attacks on Blinding Countermeasure against Horizontal CPA (수평적 상관관계 분석에 안전한 블라인딩 대응기법에 대한 전력 분석 공격)

  • Lee, Sangyub;Kim, Taewon;Kim, HeeSeok;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.727-738
    • /
    • 2015
  • Until recently, power analysis is one of the most popular research issues among various side channel analyses. Since Differential Power Analysis had been first proposed by Kocher et al., various practical power analyses correspond with software/hardware cryptographic devices have been proposed. In this paper, we analyze vulnerability of countermeasure against power analysis exploiting single power trace of public cryptographic algorithm. In ICICS 2010, Clavier et al. proposed Horizontal Correlation Analysis which can recover secret information from a single exponentiation trace and corresponding countermeasures. "Blind operands in LIM", one of their countermeasures, exploits additive blinding in order to prevent leakage of intermediate value related to secret information. However, this countermeasure has vulnerability of having power leakage that is dependant with the message known by an adversary. In this paper, we analyzed vulnerabilities by three attack scenarios and proved them by practical correlation power analysis experiments.

Realization of Object Detection Algorithm and Eight-channel LiDAR sensor for Autonomous Vehicles (자율주행자동차를 위한 8채널 LiDAR 센서 및 객체 검출 알고리즘의 구현)

  • Kim, Ju-Young;Woo, Seong Tak;Yoo, Jong-Ho;Park, Young-Bin;Lee, Joong-Hee;Cho, Hyun-Chang;Choi, Hyun-Yong
    • Journal of Sensor Science and Technology
    • /
    • v.28 no.3
    • /
    • pp.157-163
    • /
    • 2019
  • The LiDAR sensor, which is widely regarded as one of the most important sensors, has recently undergone active commercialization owing to the significant growth in the production of ADAS and autonomous vehicle components. The LiDAR sensor technology involves radiating a laser beam at a particular angle and acquiring a three-dimensional image by measuring the lapsed time of the laser beam that has returned after being reflected. The LiDAR sensor has been incorporated and utilized in various devices such as drones and robots. This study focuses on object detection and recognition by employing sensor fusion. Object detection and recognition can be executed as a single function by incorporating sensors capable of recognition, such as image sensors, optical sensors, and propagation sensors. However, a single sensor has limitations with respect to object detection and recognition, and such limitations can be overcome by employing multiple sensors. In this paper, the performance of an eight-channel scanning LiDAR was evaluated and an object detection algorithm based on it was implemented. Furthermore, object detection characteristics during daytime and nighttime in a real road environment were verified. Obtained experimental results corroborate that an excellent detection performance of 92.87% can be achieved.

Study for improving attack Complexity against RSA Collision Analysis (RSA 충돌 분석 공격 복잡도 향상을 위한 연구)

  • Sim, Bo-Youn;Won, Yoo-Seung;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.261-270
    • /
    • 2015
  • In information security devices, such as Smart Cards, vulnerabilities of the RSA algorithm which is used to protect the data were found in the Side Channel Analysis. The RSA is especially vulnerable to Power Analysis which uses power consumption when the algorithm is working. Typically Power Analysis is divided into SPA(Simple Power Analysis) and DPA(Differential Power Analysis). On top of this, there is a CA(Collision Analysis) which is a very powerful attack. CA makes it possible to attack using a single waveform, even if the algorithm is designed to secure against SPA and DPA. So Message blinding, which applies the window method, was considered as a countermeasure. But, this method does not provide sufficient safety when the window size is small. Therefore, in this paper, we propose a new countermeasure that provides higher safety against CA. Our countermeasure is a combination of message and exponent blinding which is applied to the window method. In addition, through experiments, we have shown that our countermeasure provides approximately 124% higher attack complexity when the window size is small. Thus it can provide higher safety against CA.

Single-Channel Speech Separation Using Phase Model-Based Soft Mask (위상 모델 기반의 소프트 마스크를 이용한 단일 채널 음성분리)

  • Lee, Yun-Kyung;Kwon, Oh-Wook
    • The Journal of the Acoustical Society of Korea
    • /
    • v.29 no.2
    • /
    • pp.141-147
    • /
    • 2010
  • In this paper, we propose a new speech separation algorithm to extract and enhance the target speech signals from mixed speech signals by utilizing both magnitude and phase information. Since the previous statistical modeling algorithms assume that the log power spectrum values of the mixed speech signals are independent in the temporal and frequency domain, discontinuities occur in the resultant separated speech signals. To reduce the discontinuities, we apply a smoothing filter in the time-frequency domain. To further improve speech separation performance, we propose a statistical model based on both magnitude and phase information of speech signals. Experimental results show that the proposed algorithm improve signal-to-interference ratio (SIR) by 1.5 dB compared with the previous magnitude-only algorithms.

A Low Power and Area Efficient FIR filter for PRML Read Channels (저전력 및 효율적인 면적을 갖는 PRML Read Channel 용 FIR 필터)

  • 조병각;강진용;선우명훈
    • Proceedings of the IEEK Conference
    • /
    • 2000.09a
    • /
    • pp.255-258
    • /
    • 2000
  • 본 논문에서는 효율적인 면적의 저전력 FIR 필터를 제안한다. 제안된 필터는 6 비트 8 탭의 구조를 갖는PRML(Partial-Response Maximum Likelihood) 디스크드라이브 read channel용 FIR 필터이다 제안된 구조는 병렬연산 구조를 채택하고 있으며 네 단의 파이프라인 구조를 가지고 있다. 곱셈을 위하여 부스 알고리즘이 사용되며 압축기를 이용하여 덧셈을 수행한다. 저전력을 위해 CMOS 패스 트랜지스터를 사용하였으며 면적을 줄이기 위해 single-rail 로직을 사용하였다 제안된 구조를 0.65㎛ CMOS 공정을 이용하여 설계하였으며1.88 × 1.38㎟의 면적을 차지하였고 HSPICE 시뮬레이션 결과 3.3V의 공급전압에서 100㎒로 동작시 120㎽의 전력을 소모한다. 제안된 구조는 기존의 구조들에 비해 약 11%의 전력이 감소했으며 약 33%의 면적이 감소하였다.

  • PDF

Design of Fuzzy Logic Adaptive Filters for Active Mufflers (능동 머플러를 위한 퍼지논리 적응필터의 설계)

  • Ahn, Dong-Jun;Park, Ki-Hong;Kim, Sun-Hee;Nam, Hyun-Do
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.19 no.4
    • /
    • pp.84-90
    • /
    • 2011
  • In active noise control filter, LMS algorithms which used for control filter, assure the convergence property, and computational burden of these algorithms are proportionate to the filter taps. The convergence speed of LMS algorithms is mainly determined by value of the convergence coefficient, so optimal selection of the value of convergence coefficient is very important. In this paper, We proposed novel adaptive fuzzy logic LMS algorithms with FIR filter structure which has better convergence speed and less computational burden than conventional LMS algorithms, for single channel active noise control with ill conditioned signal case. Computer simulations were performed to show the effectiveness of a proposed algorithms.

Optimal Broadcast Scheduling Using Artificial Bee Colony (Artificial Bee Colony 알고리즘을 적용한 Broadcast Scheduling 최적 설계)

  • Kim, Sung-Soo;Byeon, Ji-Hwan
    • Korean Management Science Review
    • /
    • v.28 no.1
    • /
    • pp.43-52
    • /
    • 2011
  • The basic objective of broadcast scheduling is to get the smallest length TDMA frame, where many nodes are allowed to transmit simultaneously in a single time slot in a conflict-free manner. The secondary objective is to maximize the number of such transmissions for maximum use of the channel. An Artificial Bee Colony (ABC) with ranking strategy is proposed in this paper for the broadcast scheduling problem. Our proposed method is very efficient for generating initial and neighbor feasible solutions. We can get the best number of time slots and transmission utilization comparing to previous researches.

A New LMS Algorithm for Improved Convergence Time in Active Noise Control (수렴속도 개선을 위한 새로운 LMS 알고리즘)

  • Park, Kyoung-Ho;Kim, Il-Hwan
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.7 no.3
    • /
    • pp.276-279
    • /
    • 2001
  • Many industrial processes that are operated by rotating machines and large air-moving fans are excellent examples to which the single channel ANC systems can be applied. In these environments, the active noise control techniques are most popular nowadays. In this paper, a modified LMS algorithm(EAC, Error Amplitude Compared) is proposed. The algorithm is a kind of variable step-size LMS-type algorithm. Computer simulations show that the proposed EAC algorithm achieves a better convergence time than a conventional VS(Variable Step-Size) algorithm, Also, this algorithm has been implemented by using and experimental duct system.

  • PDF