• Title/Summary/Keyword: brute force

Search Result 116, Processing Time 0.023 seconds

Basis Translation Matrix between Two Isomorphic Extension Fields via Optimal Normal Basis

  • Nogami, Yasuyuki;Namba, Ryo;Morikawa, Yoshitaka
    • ETRI Journal
    • /
    • v.30 no.2
    • /
    • pp.326-334
    • /
    • 2008
  • This paper proposes a method for generating a basis translation matrix between isomorphic extension fields. To generate a basis translation matrix, we need the equality correspondence of a basis between the isomorphic extension fields. Consider an extension field $F_{p^m}$ where p is characteristic. As a brute force method, when $p^m$ is small, we can check the equality correspondence by using the minimal polynomial of a basis element; however, when $p^m$ is large, it becomes too difficult. The proposed methods are based on the fact that Type I and Type II optimal normal bases (ONBs) can be easily identified in each isomorphic extension field. The proposed methods efficiently use Type I and Type II ONBs and can generate a pair of basis translation matrices within 15 ms on Pentium 4 (3.6 GHz) when $mlog_2p$ = 160.

  • PDF

Fingerprint Template Protection Using One-Time Fuzzy Vault

  • Choi, Woo-Yong;Chung, Yong-Wha;Park, Jin-Won;Hong, Do-Won
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.2221-2234
    • /
    • 2011
  • The fuzzy vault scheme has emerged as a promising solution to user privacy and fingerprint template security problems. Recently, however, the fuzzy vault scheme has been shown to be susceptible to a correlation attack. This paper proposes a novel scheme for one-time templates for fingerprint authentication based on the fuzzy vault scheme. As in one-time passwords, the suggested method changes templates after each completion of authentication, and thus the compromised templates cannot be reused. Furthermore, a huge number of chaff minutiae can be added by expanding the size of the fingerprint image. Therefore, the proposed method can protect a user's fingerprint minutiae against the correlation attack. In our experiments, the proposed approach can improve the security level of a typical approach against brute-force attack by the factor of $10^{34}$.

Analysis of Security Weakness on Secure Deduplication Schemes in Cloud Storage (클라우드 스토리지에서 안전한 중복 제거 기법들에 대한 보안 취약점 분석)

  • Park, Ji Sun;Shin, Sang Uk
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.8
    • /
    • pp.909-916
    • /
    • 2018
  • Cloud storage services have many advantages. As a result, the amount of data stored in the storage of the cloud service provider is increasing rapidly. This increase in demand forces cloud storage providers to apply deduplication technology for efficient use of storages. However, deduplication technology has inherent security and privacy concerns. Several schemes have been proposed to solve these problems, but there are still some vulnerabilities to well-known attacks on deduplication techniques. In this paper, we examine some of the existing schemes and analyze their security weaknesses.

Exactly Solvable Potentials Derived from SWKB Quantization

  • Sun, Hosung
    • Bulletin of the Korean Chemical Society
    • /
    • v.35 no.3
    • /
    • pp.805-810
    • /
    • 2014
  • The shape invariant potentials are proved to be exactly solvable, i.e. the wave functions and energies of a particle moving under the influence of the shape invariant potentials can be algebraically determined without any approximations. It is well known that the SWKB quantization is exact for all shape invariant potentials though the SWKB quantization itself is approximate. This mystery has not been mathematically resolved yet and may not be solved in a concrete fashion even in the future. Therefore, in the present work, to understand (not prove) the mystery an attempt of deriving exactly solvable potentials directly from the SWKB quantization has been made. And it turns out that all the derived potentials are shape invariant. It implicitly explains why the SWKB quantization is exact for all known shape invariant potentials. Though any new potential has not been found in this study, this brute-force derivation of potentials helps one understand the characteristics of shape invariant potentials.

Design of a motion estimator with systolic array structure (Systolic array 구조를 갖는 움직임 추정기 설계)

  • 정대호;최석준;김환영
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.34C no.10
    • /
    • pp.36-42
    • /
    • 1997
  • In the whole world, the research about the VLSI implementation of motion estimation algorithm is progressed to actively full (brute force) search algorithm research with the development of systolic array possible to parallel and pipeline processing. But, because of processing time's limit in a field to handle a huge data quantily such as a high definition television, many problems are happened to full search algorithm. In the paper, as a fast processing to using parallel scheme for the serial input image data, motion estimator of systolic array structure verifying that processing time is improved in contrast to the conventional full search algorithm.

  • PDF

Motion Estimation Algorithm based on Bit-plane Matching (비트 플레인 정합에 의한 움직임 추정 알고리즘)

  • 이성희;이경훈;고성제
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 1997.11a
    • /
    • pp.119-122
    • /
    • 1997
  • 움직임 추정(motion estimation)은 압축 부호화나 영상 안정화 시스템, 비젼 시스템 등과 같은 동영상 처리에 있어서 핵심 기술 중의 하나이다. 그러나 기존의 전역 탐색(brute-force) 알고리즘과 같은 움직임 추정 기법은 방대한 양의 계산을 필요로 하기 때문에 처리 시간이 커지고, 하드웨어로 구현하였을 때 회로가 복잡해진다는 문제점을 안고 있다. 본 논문에서는 비트 플레인(bit-plane)에서의 정합을 이용하여 움직임을 추정하는 새로운 기법을 제안한다. 제안된 기법에서는 기존의 전역 탐색 알고리즘을 하나의 비트 플레인으로부터 추출한 이진 영상에 적용함으로써 움직임 추정에 소요되는 계산량을 크게 줄이면서도 우수한 움직임 추정 성능을 갖도록 하였다. 실험 부분에서는 동영상으로부터 카메라의 이동으로 인한 전역적인 움직임을 추정하는데 제안된 기법을 사용한 결과를 제시하였다. 특히 제안된 기법은 비트 플레인을 선정하는데 있어서 적응 기법을 적용하였기 때문에 조도 변화 등과 같은 열악한 환경에서도 안정적으로 동작한다는 것을 실험을 통하여 보였다.

  • PDF

Conditional Re-encoding Method for Cryptanalysis-Resistant White-Box AES

  • Lee, Seungkwang;Choi, Dooho;Choi, Yong-Je
    • ETRI Journal
    • /
    • v.37 no.5
    • /
    • pp.1012-1022
    • /
    • 2015
  • Conventional cryptographic algorithms are not sufficient to protect secret keys and data in white-box environments, where an attacker has full visibility and control over an executing software code. For this reason, cryptographic algorithms have been redesigned to be resistant to white-box attacks. The first white-box AES (WB-AES) implementation was thought to provide reliable security in that all brute force attacks are infeasible even in white-box environments; however, this proved not to be the case. In particular, Billet and others presented a cryptanalysis of WB-AES with 230 time complexity, and Michiels and others generalized it for all substitution-linear transformation ciphers. Recently, a collision-based cryptanalysis was also reported. In this paper, we revisit Chow and others's first WB-AES implementation and present a conditional re-encoding method for cryptanalysis protection. The experimental results show that there is approximately a 57% increase in the memory requirement and a 20% increase in execution speed.

Reducing RFID Reader Load with the Meet-in-the-Middle Strategy

  • Cheon, Jung-Hee;Hong, Jeong-Dae;Tsudik, Gene
    • Journal of Communications and Networks
    • /
    • v.14 no.1
    • /
    • pp.10-14
    • /
    • 2012
  • When tag privacy is required in radio frequency identification (ID) system, a reader needs to identify, and optionally authenticate, a multitude of tags without revealing their IDs. One approach for identification with lightweight tags is that each tag performs pseudo-random function with his unique embedded key. In this case, a reader (or a back-end server) needs to perform a brute-force search for each tag-reader interaction, whose cost gets larger when the number of tags increases. In this paper, we suggest a simple and efficient identification technique that reduces readers computation to $O$(${\sqrt{N}}$ log$N$) without increasing communication cost. Our technique is based on the well-known "meet-in-the-middle" strategy used in the past to attack symmetric ciphers.

Denied Log Analysis of Firewall for SSH Brute Force Attack IP Address Pre-Filtering (SSH 무작위 대입 공격 선차단을 위한 방화벽 차단 로그 분석)

  • Lee, Jae-Kook;Kim, Sung-Jun;Woo, Joon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.643-645
    • /
    • 2015
  • SSH 무작위 대입 공격은 전통적인 공격기법이지만 최근까지도 공격이 끊임없이 발생되고 있다. 정상적인 접속을 가장한 은닉 공격(Stealth Attack)이 가능하므로 탐지가 어렵다. 본 논문에서는 방화벽 차단 로그를 분석하여 운영 중인 서버로 향할 수 있는 SSH 무작위 대입 공격 트래픽을 사전에 차단하는 기법을 제안하고, 제안한 기법을 적용한 결과 운영 중인 서버로 공격이 이어지는 것을 평균 46% 이상 예방하는 것을 확인한다.

PRaCto: Pseudo Random bit generator for Cryptographic application

  • Raza, Saiyma Fatima;Satpute, Vishal R
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.6161-6176
    • /
    • 2018
  • Pseudorandom numbers are useful in cryptographic operations for using as nonce, initial vector, secret key, etc. Security of the cryptosystem relies on the secret key parameters, so a good pseudorandom number is needed. In this paper, we have proposed a new approach for generation of pseudorandom number. This method uses the three dimensional combinational puzzle Rubik Cube for generation of random numbers. The number of possible combinations of the cube approximates to 43 quintillion. The large possible combination of the cube increases the complexity of brute force attack on the generator. The generator uses cryptographic hash function. Chaotic map is being employed for increasing random behavior. The pseudorandom sequence generated can be used for cryptographic applications. The generated sequences are tested for randomness using NIST Statistical Test Suite and other testing methods. The result of the tests and analysis proves that the generated sequences are random.