• Title/Summary/Keyword: key block

Search Result 695, Processing Time 0.026 seconds

Encryption Method Based on Chaos Map for Protection of Digital Video (디지털 비디오 보호를 위한 카오스 사상 기반의 암호화 방법)

  • Yun, Byung-Choon;Kim, Deok-Hwan
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.1
    • /
    • pp.29-38
    • /
    • 2012
  • Due to the rapid development of network environment and wireless communication technology, the distribution of digital video has made easily and the importance of the protection for digital video has been increased. This paper proposes the digital video encryption system based on multiple chaos maps for MPEG-2 video encoding process. The proposed method generates secret hash key of having 128-bit characteristics from hash chain using Tent map as a basic block and generates $8{\times}8$ lattice cipher by applying this hash key to Logistic map and Henon map. The method can reduce the encryption overhead by doing selective XOR operations between $8{\times}8$ lattice cipher and some coefficient of low frequency in DCT block and it provides simple and randomness characteristic because it uses the architecture of combining chaos maps. Experimental results show that PSNR of the proposed method is less than or equal to 12 dB with respect to encrypted video, the time change ratio, compression ratio of the proposed method are 2%, 0.4%, respectively so that it provides good performance in visual security and can be applied in real time.

Side Channel Analysis with Low Complexity in the Diffusion Layer of Block Cipher Algorithm SEED (SEED 블록 암호 알고리즘 확산계층에서 낮은 복잡도를 갖는 부채널 분석)

  • Won, Yoo-Seung;Park, Aesun;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.993-1000
    • /
    • 2017
  • When the availability of embedded device is considered, combined countermeasure such as first-order masking and hiding countermeasures is quite attractive because the security and efficiency can be provided at the same time. Especially, combined countermeasure can be applied to the confusion and diffusion layers of the first and last rounds in order to provide the efficiency. Also, the middle rounds only employs first-order masking countermeasure or no countermeasure. In this paper, we suggest a novel side channel analysis with low complexity in the output of diffusion layer. In general, the attack target cannot be set to the output of diffusion layer owing to the high complexity. When the diffusion layer of block cipher is composed of AND operations, we show that the attack complexity can be reduced. Here, we consider that the main algorithm is SEED. Then, the attack complexity with $2^{32}$ can be reduced by $2^{16}$ according to the fact that the correlation between the combination of S-box outputs and that of the outputs of diffusion layer. Moreover, compared to the fact that the main target is the output of S-box in general, we demonstrate that the required number of traces can be reduced by 43~98% in terms of simulated traces. Additionally, we show that only 8,000 traces are enough to retrieve the correct key by suggested scheme, although it fails to reveal the correct key when performing the general approach on 100,000 traces in realistic device.

Performance Improvement of Power Attacks with Truncated Differential Cryptanalysis (부정차분을 이용한 전력분석 공격의 효율 향상*)

  • Kang, Tae-Sun;Kim, Hee-Seok;Kim, Tae-Hyun;Kim, Jong-Sung;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.43-51
    • /
    • 2009
  • In 1998, Kocher et al. introduced Differential Power Attack on block ciphers. This attack allows to extract secret key used in cryptographic primitives even if these are executed inside tamper-resistant devices such as smart card. At FSE 2003 and 2004, Akkar and Goubin presented several masking methods, randomizing the first few and last few($3{\sim}4$) rounds of the cipher with independent random masks at each round and thereby disabling power attacks on subsequent inner rounds, to protect iterated block ciphers such as DES against Differential Power Attack. Since then, Handschuh and Preneel have shown how to attack Akkar's masking method using Differential Cryptanalysis. This paper presents how to combine Truncated Differential Cryptanalysis and Power Attack to extract the secret key from intermediate unmasked values and shows how much more efficient our attacks are implemented than the Handschuh-Preneel method in term of reducing the number of required plaintexts, even if some errors of Hamming weights occur when they are measured.

Post-Quantum Security Strength Evaluation through Implementation of Quantum Circuit for SIMECK (SIMEC 경량암호에 대한 양자회로 구현 및 Post-Quantum 보안 강도 평가)

  • Song Gyeong Ju;Jang Kyung Bae;Sim Min Joo;Seo Hwa Jeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.6
    • /
    • pp.181-188
    • /
    • 2023
  • Block cipher is not expected to be safe for quantum computer, as Grover's algorithm reduces the security strength by accelerating brute-force attacks on symmetric key ciphers. So it is necessary to check the post-quantum security strength by implementing quantum circuit for the target cipher. In this paper, we propose the optimal quantum circuit implementation result designed as a technique to minimize the use of quantum resources (qubits, quantum gates) for SIMECK lightweight cryptography, and explain the operation of each quantum circuit. The implemented SIMECK quantum circuit is used to check the estimation result of quantum resources and calculate the Grover attack cost. Finally, the post-quantum strength of SIMECK lightweight cryptography is evaluated. As a result of post-quantum security strength evaluation, all SIMECK family cipher failed to reach NIST security strength. Therefore, it is expected that the safety of SIMECK cipher is unclear when large-scale quantum computers appear. About this, it is judged that it would be appropriate to increase the block size, the number of rounds, and the key length to increase the security strength.

ATM Cell Encipherment Method using Rijndael Algorithm in Physical Layer (Rijndael 알고리즘을 이용한 물리 계층 ATM 셀 보안 기법)

  • Im Sung-Yeal;Chung Ki-Dong
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.83-94
    • /
    • 2006
  • This paper describes ATM cell encipherment method using Rijndael Algorithm adopted as an AES(Advanced Encryption Standard) by NIST in 2001. ISO 9160 describes the requirement of physical layer data processing in encryption/decryption. For the description of ATM cell encipherment method, we implemented ATM data encipherment equipment which satisfies the requirements of ISO 9160, and verified the encipherment/decipherment processing at ATM STM-1 rate(155.52Mbps). The DES algorithm can process data in the block size of 64 bits and its key length is 64 bits, but the Rijndael algorithm can process data in the block size of 128 bits and the key length of 128, 192, or 256 bits selectively. So it is more flexible in high bit rate data processing and stronger in encription strength than DES. For tile real time encryption of high bit rate data stream. Rijndael algorithm was implemented in FPGA in this experiment. The boundary of serial UNI cell was detected by the CRC method, and in the case of user data cell the payload of 48 octets (384 bits) is converted in parallel and transferred to 3 Rijndael encipherment module in the block size of 128 bits individually. After completion of encryption, the header stored in buffer is attached to the enciphered payload and retransmitted in the format of cell. At the receiving end, the boundary of ceil is detected by the CRC method and the payload type is decided. n the payload type is the user data cell, the payload of the cell is transferred to the 3-Rijndael decryption module in the block sire of 128 bits for decryption of data. And in the case of maintenance cell, the payload is extracted without decryption processing.

Analysis of Grover Attack Cost and Post-Quantum Security Strength Evaluation for Lightweight Cipher SPARKLE SCHWAEMM (경량암호 SPARKLE SCHWAEMM에 대한 Grover 공격 비용 분석 및 양자 후 보안 강도 평가)

  • Yang, Yu Jin;Jang, Kyung Bae;Kim, Hyun Ji;Song, Gyung Ju;Lim, Se Jin;Seo, Hwa Jeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.12
    • /
    • pp.453-460
    • /
    • 2022
  • As high-performance quantum computers are expected to be developed, studies are being actively conducted to build a post-quantum security system that is safe from potential quantum computer attacks. When the Grover's algorithm, a representative quantum algorithm, is used to search for a secret key in a symmetric key cryptography, there may be a safety problem in that the security strength of the cipher is reduced to the square root. NIST presents the post-quantum security strength estimated based on the cost of the Grover's algorithm required for an attack of the cryptographic algorithm as a post-quantum security requirement for symmetric key cryptography. The estimated cost of Grover's algorithm for the attack of symmetric key cryptography is determined by the quantum circuit complexity of the corresponding encryption algorithm. In this paper, the quantum circuit of the SCHWAEMM algorithm, AEAD family of SPARKLE, which was a finalist in NIST's lightweight cryptography competition, is efficiently implemented, and the quantum cost to apply the Grover's algorithm is analyzed. At this time, the cost according to the CDKM ripple-carry adder and the unbounded Fan-Out adder is compared together. Finally, we evaluate the post-quantum security strength of the lightweight cryptography SPARKLE SCHWAEMM algorithm based on the analyzed cost and NIST's post-quantum security requirements. A quantum programming tool, ProjectQ, is used to implement the quantum circuit and analyze its cost.

Improved AR-FGS Coding Scheme for Scalable Video Coding (확장형 비디오 부호화(SVC)의 AR-FGS 기법에 대한 부호화 성능 개선 기법)

  • Seo, Kwang-Deok;Jung, Soon-Heung;Kim, Jin-Soo;Kim, Jae-Gon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12C
    • /
    • pp.1173-1183
    • /
    • 2006
  • In this paper, we propose an efficient method for improving visual quality of AR-FGS (Adaptive Reference FGS) which is adopted as a key scheme for SVC (Scalable Video Coding) or H.264 scalable extension. The standard FGS (Fine Granularity Scalability) adopts AR-FGS that introduces temporal prediction into FGS layer by using a high quality reference signal which is constructed by the weighted average between the base layer reconstructed imageand enhancement reference to improve the coding efficiency in the FGS layer. However, when the enhancement stream is truncated at certain bitstream position in transmission, the rest of the data of the FGS layer will not be available at the FGS decoder. Thus the most noticeable problem of using the enhancement layer in prediction is the degraded visual quality caused by drifting because of the mismatch between the reference frame used by the FGS encoder and that by the decoder. To solve this problem, we exploit the principle of cyclical block coding that is used to encode quantized transform coefficients in a cyclical manner in the FGS layer. Encoding block coefficients in a cyclical manner places 'higher-value' bits earlier in the bitstream. The quantized transform coefficients included in the ealry coding cycle of cyclical block coding have higher probability to be correctly received and decoded than the others included in the later cycle of the cyclical block coding. Therefore, we can minimize visual quality degradation caused by bitstream truncation by adjusting weighting factor to control the contribution of the bitstream produced in each coding cycle of cyclical block coding when constructing the enhancement layer reference frame. It is shown by simulations that the improved AR-FGS scheme outperforms the standard AR-FGS by about 1 dB in maximum in the reconstructed visual quality.

Improvement in Water Resistance of Desulfurized Gypsum by Novel Modification of Silicone Oil Paraffin Composite Emulsion-based Waterproofing Agent

  • Cao, Jing-Yu;Li, Jin-Peng;Jiang, Ya-Mei;Wang, Su-Lei;Ding, Yi;Oh, Won-Chun
    • Journal of the Korean Ceramic Society
    • /
    • v.56 no.6
    • /
    • pp.558-565
    • /
    • 2019
  • In this study, dimethyl silicone oil and liquid paraffin were combined and subsequently emulsified; the resulting mixture was innovatively incorporated into desulfurized gypsum to resolve its drawback of a poor water resistance. The waterproof mechanism of the composite emulsion and liquid paraffin emulsion with mass fractions of 1%, 2%, 3%, and 4% were investigated. The effect of the desulfurized gypsum on the waterproof performance and basic mechanical properties were also investigated. The configuration of the composite waterproofing agent was characterized by FTIR and 1HNMR. The results showed that, compared with the traditional liquid paraffin emulsion-based waterproofing agent, the softening coefficient of the silicone oil paraffin composite emulsion-based water-repellent agent was increased by 60% and attained a value of 0.89. Combined with the waterproof mechanism and microscope morphology analysis of gypsum hydration products, the improvement in the water resistance of water resistance was primarily attributed to the formation of a silicone hydrophobic membrane between the crystals of the gypsum block; this ensured that water could not penetrate the crystal.

Ginsenoside (20S)Rg3 Ameliorates Synaptic and Memory Deficits in an Animal Model of Alzheimer's Disease

  • Kim, Tae-Wan
    • 한국약용작물학회:학술대회논문집
    • /
    • 2011.09a
    • /
    • pp.31-45
    • /
    • 2011
  • The amyloid ${\beta}$-peptide ($A{\beta}$), which originates from the proteolytic cleavage of amyloid precursor protein (APP), plays a central role in the pathogenesis of Alzheimer's disease (AD). Mounting evidence indicates that different species of $A{\beta}$, such as $A{\beta}$ oligomers and fibrils, may contribute to AD pathogenesis via distinct mechanisms at different stages of the disease. Importantly, elevation and accumulation of soluble $A{\beta}$ oligomers closely correlate with cognitive decline and/or disease progression in animal models of AD. In agreement with these studies, oligomers of $A{\beta}$ have been shown to directly affect synaptic plasticity, a neuronal process that is known to be essential for memory formation. Our previous studies showed that $A{\beta}$ induces the breakdown of phosphatidylinositol 4,5-bisphosphate (PI(4,5)P2), a phospholipid that regulates key aspects of neuronal function. PI(4,5)P2 breakdown was found to be a key step toward synaptic and memory dysfunction in a mouse model of AD. To this end, we seek to identify small molecules that could elevate the levels of PI(4,5)P2 and subsequently block $A{\beta}$ oligomer-induced breakdown of PI(4,5)P2 and synaptic dysfunction.. We found that (20S)Rg3, an active triterpene glycoside from heat-processed ginseng, serves as an agonist for phosphatidylinositol 4-kinase IIalpha (PI4KIIalpha), which is a lipid kinase that mediates a rate-limiting step in PI(4,5)P2 synthesis. Consequently, (20S)Rg3 stimulates PI(4,5)P2 synthesis by directly stimulating the activity of PI4KIIalpha. Interestingly, treatment of a mouse model of AD with (20S)Rg3 leads to reversal of memory deficits. Our data suggest that the PI(4,5)P2-promoting effects of (20S)Rg3 may help mitigate the cognitive symptoms associated with AD.

  • PDF

A Study on the Design of a New Type Feedforward Linearizer Using Delay Line to Control Correction Amplifier (Correction증폭기 제어용 Delay Line을 이용한 새로운 형의 Feedforward 선형화기 설계에 관한 연구)

  • Gang, Won-Tae;Jang, Ik-Ju;Nam, Sang-Dae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.37 no.2
    • /
    • pp.75-82
    • /
    • 2000
  • In this Paper, a new type of feedforward linearizer using a delay line which controls the phase characteristics of the correction amplifier block is proposed. The extra delay line provides the control-ability of IM signals so that the IM rejection is accomplished without the conventional pilot tone. The error signal loop consists of several key components such as phase shifter and attenuator, subtractor. These key components are replaced by new designs in order to obtain better linearization characteristics without the pilot tone generator which is indispensable in the conventional linearizer designs. The proposed linearizer was designed at Korean PCS band and combined with 35W HPA manufactured by KMW inc., and tested with two-tone signals separated 0.6MHz apart at the center frequency of 1855MHz. The experimental results show C/l improvement by 16.9 ~ 24.6 dB over 15 dB dynamic range(30 ~45 dBm) which gave IMD of 58.5~63.2 dBc for the designed LPA.

  • PDF