• Title/Summary/Keyword: key block

Search Result 695, Processing Time 0.026 seconds

New Power Analysis Attack on The Masking Type Conversion Algorithm (마스킹 형태 변환 알고리즘에 대한 새로운 전력 분석 공격)

  • Cho, Young-In;Kim, Hee-Seok;Han, Dong-Guk;Hong, Seok-Hie;Kang, Ju-Sung
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.47 no.1
    • /
    • pp.159-168
    • /
    • 2010
  • In the recent years, power analysis attacks were widely investigated, and so various countermeasures have been proposed. In the case of block ciphers, masking methods that blind the intermediate results in the algorithm computations(encryption, decryption, and key-schedule) are well-known. The type conversion of masking is unavoidable since Boolean operation and Arithmetic operation are performed together in block cipher. Messerges proposed a masking type conversion algorithm resistant general power analysis attack and then it's vulnerability was reported. We present that some of exiting attacks have some practical problems and propose a new power analysis attack on Messerges's algorithm. After we propose the strengthen DPA and CPA attack on the masking type conversion algorithm, we show that our proposed attack is a practical threat as the simulation results.

A Secure Deletion Method for NAND Flash File System (NAND 플래시 파일 시스템을 위한 안전 삭제 기법)

  • Lee, Jae-Heung;Oh, Jin-Ha;Kim, Seok-Hyun;Yi, Sang-Ho;Heo, Jun-Young;Cho, Yoo-Kun;Hong, Ji-Man
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.3
    • /
    • pp.251-255
    • /
    • 2008
  • In most file systems, if a file is deleted, only the metadata of the file is deleted or modified and the file's data is still stored on the physical media. Some users require that deleted files no longer be accessible. This requirement is more important in embedded systems that employ flash memory as a storage medium. In this paper, we propose a secure deletion method for NAND flash file system and apply the method to YAFFS. Our method uses encryption to delete files and forces all keys of a specific file to be stored in the same block. Therefore, only one erase operation is required to securely delete a file. Our simulation results show that the amortized number of block erases is smaller than the simple encryption method. Even though we apply our method only to the YAFFS, our method can be easily applied to other NAND flash file systems.

CP-ABE Access Control that Block Access of Withdrawn Users in Dynamic Cloud

  • Hwang, Yong-Woon;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.4136-4156
    • /
    • 2020
  • Recently, data can be safely shared or stored using the infrastructure of cloud computing in various fields. However, issues such as data security and privacy affect cloud environments. Thus, a variety of security technologies are required, one of them is security technology using CP-ABE. Research into the CP-ABE scheme is currently ongoing, but the existing CP-ABE schemes can pose security threats and are inefficient. In terms of security, the CP-ABE approach should be secure against user collusion attacks and masquerade attacks. In addition, in a dynamic cloud environment where users are frequently added or removed, they must eliminate user access when they leave, and so users will not be able to access the cloud after removal. A user who has left should not be able to access the cloud with the existing attributes, secret key that had been granted. In addition, the existing CP-ABE scheme increases the size of the ciphertext according to the number of attributes specified by the data owner. This leads to inefficient use of cloud storage space and increases the amount of operations carried out by the user, which becomes excessive when the number of attributes is large. In this paper, CP-ABE access control is proposed to block access of withdrawn users in dynamic cloud environments. This proposed scheme focuses on the revocation of the attributes of the withdrawn users and the output of a ciphertext of a constant-size, and improves the efficiency of the user decryption operation through outsourcing.

Synthesis, Characterization and Haemocompatibility of Poly(styrene-b-isobutylene-b-styrene) Triblock Copolymers (폴리(스티렌-이소부틸렌-스티렌) 삼중블록 공중합체의 합성, 분석 및 혈액적합성)

  • Ren, Ping;Wu, Yi-Bo;Guo, Wen-Ii;Li, Shu-Xin;Mao, Jing;Xiao, Fei;Li, Kang
    • Polymer(Korea)
    • /
    • v.35 no.1
    • /
    • pp.40-46
    • /
    • 2011
  • The synthesis of well-defined poly(styrene-b-isobutylene-b-styrene) (SIBS) triblock copolymers was accomplished by cationic sequential block copolymerization of isobutylene (IB) with styrene (St) using 1,4-di(2-chloro-2-propyl) benzene (DCC) /$TiCl_4$/2,6-di-tert-butylpyridine(DtBP) as an initiating system in methyl chloride ($CH_3Cl$)/methylcyclohexane(MeChx) (50/50 v/v) solvent mixture at $-80^{\circ}C$. The triblock copolymers exhibited excellent thermoplastic and elastomeric characteristics. Tensile strengths and Shore hardness increased with increasing polystyrene (PS) content, while elongation at break decreased. The blood-compatibility of SIBS was assessed by SEM observation of the platelet adhesion, blood clotting time and haemolysis ratio. The haemolysis ratios were below 5% which met the medical materials standard. The platelet adhesion test further indicated that SIBS block copolymers had a good blood compatibility.

A Comperative Study on Purchase Recognition between Domestic Broadcasting Equipment Demanders and Suppliers (국내방송장비 수요처와 공급자의 구매인식 비교 연구)

  • Yun, Myeongjin;Cho, Yongsuck;Lee, Seonhee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.2
    • /
    • pp.39-44
    • /
    • 2017
  • In this study, we compared the perception of absolute purchase of equipment for broadcasting equipment purchasing demand according to the rapid change of domestic content production and distribution method, and the degree of information such as technical reliability and system stability of domestic broadcasting equipment perceived by consumer The effects were analyzed through a research model. Due to the lack of existing research data on broadcasting equipment demand, we conducted in depth interviews with surveys of broadcasting equipment and surveys. As a result of analysis, compared to foreign equipments, there are many cases of purchase of domestic equipments, systems, and block purchases. To improve the preference and satisfaction of Korean broadcasting equipment, which is recognized by domestic demand for broadcasting equipment, it is urgent to improve the technical reliability and to develop core key equipment and to expand the demand of domestic equipment limited to small power transmitter antenna and monitor equipment. It is urgent to develop in order to develop overseas and to support the domestic market to secure the domestic market.

Secure Mobile-in-Vehicle System with CBC-MAC authentication (CBC-MAC 방식을 적용한 보안 모바일기기 제어시스템)

  • Hwang, Jae-Young;Choi, Dong-Wook;Chung, Yeon-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.12
    • /
    • pp.2657-2662
    • /
    • 2010
  • Demand on information security in mobile devices based control system grows rapidly with a view to counteracting information hacking and leakage. Among these techniques, encryption and authentication are most common. This paper presents CBC-MAC (Cipher Block Chaining-Message Authentication Code) based mobile devices control system. The system is termed as Secure Mobile in Vehicle (SMIV)We use CBC-MAC that is one of the most efficient authentication modes to protect information against any malicious attacks. By sharing the secret key of CBC-MAC between the transmitter and receiver, it asserts authentic information. The proposed system is verified in such a way that we develop mobile devices control system, apply the CBC-MAC algorithm to the control system and validate the received data. Unlike conventional systems where the development of control mechanism in mobile devices based control systems is main concern, this proposed system offers a secure communication link of the data in mobile devices control system and therefore would be useful to the design and implementation of various mobile devices based control systems.

Data Compression Capable of Error Control Using Block-sorting and VF Arithmetic Code (블럭정렬과 VF형 산술부호에 의한 오류제어 기능을 갖는 데이터 압축)

  • Lee, Jin-Ho;Cho, Suk-Hee;Park, Ji-Hwan;Kang, Byong-Uk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.5
    • /
    • pp.677-690
    • /
    • 1995
  • In this paper, we propose the high efficiency data compression capable of error control using block-sorting, move to front(MTF) and arithmetic code with variable length in to fixed out. First, the substring with is parsed into length N is shifted one by one symbol. The cyclic shifted rows are sorted in lexicographical order. Second, the MTF technique is applied to get the reference of locality in the sorted substring. Then the preprocessed sequence is coded using VF(variable to fixed) arithmetic code which can be limited the error propagation in one codeword. The key point is how to split the fixed length codeword in proportion to symbol probabilities in VF arithmetic code. We develop the new VF arithmetic coding that split completely the codeword set for arbitrary source alphabet. In addition to, an extended representation for symbol probability is designed by using recursive Gray conversion. The performance of proposed method is compared with other well-known source coding methods with respect to entropy, compression ratio and coding times.

  • PDF

MAC Scheduling Scheme for VoIP Traffic Service in 3G LTE (3G LTE VoIP 트래픽 서비스를 위한 MAC 스케줄링 기법)

  • Jun, Kyung-Koo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.6A
    • /
    • pp.558-564
    • /
    • 2007
  • 3G Long Term Evolution, which aims for various mobile multimedia service provision by enhanced wireless interface, proposes VoIP-based voice service through a Packet Switching (PS) domain. As delay and loss-sensitive VoIP traffic flows through the PS domain, more challenging technical difficulties are expected than in Circuit Switching (CS) domain based VoIP services. Moreover, since 3G LTE, which adopts the OFDM as its physical layer, introduces Physical Resource Block (PRB) as a unit for transmission resources, new types of resource management schemes are needed. This paper proposes a PRB scheduling algorithm of MAC layer for VoIP service in 3G LTE and shows the simulation results. The proposed algorithm has two key parts; dynamic activation of VoIP priority mode to satisfy VoIP QoS requirements and adaptive adjustment of the priority mode duration in order to minimize the degradation of resource utilization.

Research on the relationship of store unit configuration and business activation of street mall - Based on case studies of street malls in Korea - (스트릿 몰(Street Mall)의 매장 배분계획과 영업활성화의 관계에 대한 연구 - 국내 스트릿 몰의 사례를 중심으로 -)

  • Woo, Seung-Hyun;Yoon, Hea-Kyung
    • Korean Institute of Interior Design Journal
    • /
    • v.18 no.6
    • /
    • pp.202-210
    • /
    • 2009
  • This research was undertaken to prove the relationship between street mall activation and architectural plan design. The research methodology was established based on the analysis of data of two existing street malls in Korea (Western Dome & LaFesta) and theoretical studies of outdoor space design. The findings from this study are the following: First, building blocks with segments in every 50m or so are ideal for detailed communication between visitors and building contents. Second, the ratio of width of main corridor and building height should be less than 1 to provide intimate feel and keep visitors' attention concentrated in the facility. Third, store unit should have more storefronts to be exposed more to passers-by and lead more pedestrian traffic. Fourth, shape of store unit would rather be wide and shallow, instead of narrow and deep, to have more exposure to the central corridor. Fifth, the building block of the busiest(most expensive) area that is usually at the main entrance area of street mall should be flexible to fit more smaller units to maximize the profitability. Sixth, the main entrance of store should face the main pedestrian corridor to induce the influx of visitors. Lastly seventh, anchor tenant that has strong name recognition is usually located on basement or higher level to induce pedestrian traffic into the mall, key tenants that are strong and familiar brand names should be located at the corner of building block with spacing to attract visitors, provide even distribution of traffic, and support wayfinding, and local tenant should be located at small units along the central corridor or remainder spaces occurred from building core layout.

Design of Link Cost Metric for IEEE 802.11-based Mesh Routing (IEEE 802.11 MAC 특성을 고려한 무선 메쉬 네트워크용 링크 품질 인자 개발)

  • Lee, Ok-Hwan;Kim, Seong-Kwan;Choi, Sung-Hyun;Lee, Sung-Ju
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.5
    • /
    • pp.456-469
    • /
    • 2009
  • We develop a new wireless link quality metric, ECOT(Estimated Channel Occupancy Time) that enables a high throughput route setup in wireless mesh networks. The key feature of ECOT is to be applicable to diverse mesh network environments where IEEE 802.11 MAC (Medium Access Control) variants are used. We take into account the exact operational features of 802.11 MAC protocols, such as 802.11 DCF(Distributed Coordination Function), 802.11e EDCA(Enhanced Distributed Channel Access) with BACK (Block Acknowledgement), and 802.11n A-MPDU(Aggregate MAC Protocol Data Unit), and derive the integrated link metric based on which a high throughput end-to-end path is established. Through extensive simulation in random-topology settings, we evaluate the performance of proposed link metric and present that ECOT shows 8.5 to 354.4% throughput gain over existing link metrics.