• Title/Summary/Keyword: keys

Search Result 1,082, Processing Time 0.031 seconds

Single Trace Analysis against HyMES by Exploitation of Joint Distributions of Leakages (HyMES에 대한 결합 확률 분포 기반 단일 파형 분석)

  • Park, ByeongGyu;Kim, Suhri;Kim, Hanbit;Jin, Sunghyun;Kim, HeeSeok;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1099-1112
    • /
    • 2018
  • The field of post-quantum cryptography (PQC) is an active area of research as cryptographers look for public-key cryptosystems that can resist quantum adversaries. Among those categories in PQC, code-based cryptosystem provides high security along with efficiency. Recent works on code-based cryptosystems focus on the side-channel resistant implementation since previous works have indicated the possible side-channel vulnerabilities on existing algorithms. In this paper, we recovered the secret key in HyMES(Hybrid McEliece Scheme) using a single power consumption trace. HyMES is a variant of McEliece cryptosystem that provides smaller keys and faster encryption and decryption speed. During the decryption, the algorithm computes the parity-check matrix which is required when computing the syndrome. We analyzed HyMES using the fact that the joint distributions of nonlinear functions used in this process depend on the secret key. To the best of our knowledge, we were the first to propose the side-channel analysis based on joint distributions of leakages on public-key cryptosystem.

A New Secure Multicast Protocol in Micro-Mobility Environments using Secure Group Key (마이크로 모빌리티 환경에서 보안 그룹키를 이용한 안전한 멀티캐스트 프로토콜)

  • Kang, Ho-Seok;Shim, Young-Chul
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.573-586
    • /
    • 2008
  • The improved performance and miniaturization of computer and the improvement of wireless communication technology have enabled the emergence of many high quality services. Among them multicast services are receiving much attention and their usage is increasing due to the increase of Internet multimedia services such as video conference, multimedia stream, internet TV, etc. Security plays an important role in mobile multicast services. In this paper, we proposed a secure multicast protocol for a hierarchical micro-mobility environment. The proposed secure multicast protocol provides security services such as authentication, access control, confidentiality and integrity using mechanisms including symmetric/asymmetric key crypto-algorithms and capabilities. To provide forward/backward secrecy and scalability, we used sub-group keys based on the hierarchical micro-mobility environment. With this security services, it is possible to guard against all kinds of security attacks performed by illegal mobile nodes. Attacks executed by internal nodes can be thwarted except those attacks which delete packet or cause network resources to be wasted. We used simulator to measure the performance of proposed protocol. As a result, the simulation showed that effect of these security mechanisms on the multicast protocol was not too high.

Memory Efficient Parallel Ray Casting Algorithm for Unstructured Grid Volume Rendering on Multi-core CPUs (비정렬 격자 볼륨 렌더링을 위한 다중코어 CPU기반 메모리 효율적 광선 투사 병렬 알고리즘)

  • Kim, Duksu
    • Journal of KIISE
    • /
    • v.43 no.3
    • /
    • pp.304-313
    • /
    • 2016
  • We present a novel memory-efficient parallel ray casting algorithm for unstructured grid volume rendering on multi-core CPUs. Our method is based on the Bunyk ray casting algorithm. To solve the high memory overhead problem of the Bunyk algorithm, we allocate a fixed size local buffer for each thread and the local buffers contain information of recently visited faces. The stored information is used by other rays or replaced by other face's information. To improve the utilization of local buffers, we propose an image-plane based ray grouping algorithm that makes ray groups have high coherency. The ray groups are then distributed to computing threads and each thread processes the given groups independently. We also propose a novel hash function that uses the index of faces as keys for calculating the buffer index each face will use to store the information. To see the benefits of our method, we applied it to three unstructured grid datasets with different sizes and measured the performance. We found that our method requires just 6% of the memory space compared with the Bunyk algorithm for storing face information. Also it shows compatible performance with the Bunyk algorithm even though it uses less memory. In addition, our method achieves up to 22% higher performance for a large-scale unstructured grid dataset with less memory than Bunyk algorithm. These results show the robustness and efficiency of our method and it demonstrates that our method is suitable to volume rendering for a large-scale unstructured grid dataset.

A Study on Institutional Foundation on the Korea Counter-Terrorism System (한국 테러대응 시스템의 제도적 구축방안)

  • Kwon, Jeong-Hoon
    • Korean Security Journal
    • /
    • no.25
    • /
    • pp.27-61
    • /
    • 2010
  • This study looks at plans for the efficient functions of the current terror response system in Korea. The results are derived from by comparing and analyzing American, British, German, Japanese, and Korean terror response systems. It focuses especially on addressing some problems with Korea's terror response system and how to operate it effectively. The study will systematically compare and analyze each nation's terror countermeasure studying organizational, functional, and legal aspects as standards. This study shows that there is not an exclusive terror response center in Korea compared with other nations such as America, the United Kingdom, Germany, and Japan. Also it is difficult to expect effective and vigorous operations due to weak cooperation across the relevant organizations. The presidential directive of the state's anti-terrorism action guidelines is legally ineffective. This means that on legal grounds, it is difficult to take actions to prevent the terrorism. Therefore, keys to counteracting terrorism derived from this study are summarized below. In the first place, an integrated terror response system should be set up for expansion of information sharing which leads to emergence effect. In the second place, the superior legislative systems should be made for the cleardefinition and extent of what the terror is, rigid enforcement of investigation, immigration, and keeping an eye on the funds raised by terrorists and tracking down the terrorists, the plan for eco-terrorism. In the third place, to augment security of vital facilities and peoples' awareness of terrorism safety should be emphasized and a cooperative system between civil and government organizations need to be built. In the fourth place, system for crisis management must be provided in an effort to maximize management system of terrorism and unify a decentralized emergency countermeasures effectively.

  • PDF

A Study on the Safety-Maximizing Design of Exclusive Bus Lanes (안전성 제고를 위한 버스전용차로 디자인 연구)

  • Yang, Chul-Su
    • Journal of Korean Society of Transportation
    • /
    • v.30 no.4
    • /
    • pp.21-32
    • /
    • 2012
  • Exclusive bus lane (EBL) is typically located in the roadway median, and is accessed by weaving across the GPLs(general purpose lanes) before entering from the left lane of the GPLs. To maximize the potential for successful EBL operations, a critical design issue that requires special attention is the length of bus weaving section before entering EBL. The process of developing guidelines for the length of bus weaving section can be supported by a sensitivity analysis of performance measure (safety) with respect to the bus weaving distance. However, field data are difficult to obtain due to inherent complexity in creating performance measure (safety) samples under various interesting flows and bus weaving distance that are keys to research success. In this paper, VISSIM simulation is applied to simulate the operation of roadway weaving areas with EBL, and based on vehicle trajectory data from microscopic traffic simulation models, the Surrogate Safety Assessment Model (SSAM) computes the number of surrogate conflicts (or degree of safety) with respect to the bus weaving distance. Then, a multiple linear regression (MLR) model using safety data (number of surrogate conflicts) is developed. Finally, guidelines for bus weaving distance are established based on the developed MLR. Developed guidelines explicitly indicate that a longer bus weaving distance is required to maintain desired safety as weaving volume increases.

Tumors of the Parotidomasseteric Area Associated with Inadequate Primary Treatment: Report of 2 Cases (부적절한 일차 처치와 연관된 이하선 종양 2례)

  • Song, Jin Woo;Choi, Hwan Jun;Kim, Mi Sun;Ahn, Hyung Sik;Kim, Jun Hyuk;Lee, Young Man
    • Archives of Plastic Surgery
    • /
    • v.33 no.6
    • /
    • pp.764-768
    • /
    • 2006
  • Purpose: Parotid neoplasia are relatively frequent, representing approximately 3% of all tumors in the head and neck regions. But incomplete resection and misdiagnosis of parotid gland is followed by multiple tumor invasion, tumor recurrence, and other iatrogenic tumor formation. In patients undergoing parotidectomy for confirmed or suspected malignancy, the traditional or modified rhytidectomy incision may prove suboptimal because it does not easily lend itself to a continuous neck dissection. Similarly, patients with tumors of the anterior accessory lobe or patients with large anterior tumors may also require the modified Blair incision for adequate surgical exposure. This report serves to revisit the topic of accessory and parotid gland neoplasms to emphasize proper management, particularly the surgical aspects, so that consequences of recurrence are avoided. Methods: This is a retrospective review of our experience with two cases of parotid tumors; one accessory parotid gland neoplasm and one parotid gland neoplasm. We report the case of parotid tumor and epidermal cyst in a 54-year old male patient and the case of case of recurrent parotid tumor with local invasion in 30-year old male patient. Results: All were removed through a modified Blair incision. Pathologic report notified that One was found pleomorphic adenoma and epidermal cyst, and the other one pleomorphic adenoma with subcutenous invasion. The patients recovered well without any complication such as infection, hematoma, facial nerve palsy, and necrosis of skin flap. Patients were discharge POD#7. Patients were followed up to for 1 year and they have no sign of recurrence. Conclusions: A high index of suspicion, prudent diagnostic skills(including fine-needle aspiration biopsy, CT, US), and meticulous surgical approach are the keys to a successful management of these lesions. We experienced two cases of parotid neoplasia, in the treatment of tumor reccurence & iatrogenic tumor arising from the parotid gland and are presented with the review of literatures.

Comparison of Anatomical Characteristics of White Jabon and Red Jabon Grown in Indonesia (인도네시아산 White Jabon과 Red Jabon의 해부학적 특성 비교)

  • Kim, Jong-Ho;Jang, Jae-Hyuk;Ryu, Jae-Yun;Hwang, Won-Joung;Febrianto, Fauzi;Kim, Nam-Hun
    • Journal of the Korean Wood Science and Technology
    • /
    • v.41 no.4
    • /
    • pp.327-336
    • /
    • 2013
  • Anatomical characteristics of White Jabon (Arthocephalus cadamba) and Red Jabon (Arthocephalus macrophyllus) were investigated by IAWA hardwood feature list. Both species were diffuse-porous, and radial multiple pore with 2~3 rows was mostly observed. Tangential diameter of vessel lumina was 100 to $200{\mu}m$, and vessels per square millimeter were 5 to 20. White Jabon has more vessels than Red Jabon. The number of solitary pore per square millimeter in both species was similar, but more pore multiple was observed in White Jabon. Axial parenchyma diffuse was observed in both species, but axial parenchyma of White Jabon was hardly identified on the cross section. Rays were classified into "body ray cells procumbent with over 4 rows of upright/square marginal cells" type and partly "all ray cells upright and/or square" type on radial section. Ray width 1 to 3 cells and 1 to 2 cells observed in White Jabon and Red Jabon, respectively. Ray height of White Jabon was $420{\mu}m$ and Red Jabon $474{\mu}m$. Fiber length was the range of 900 to $1,600{\mu}m$ in both species, and it showed a tendency to increase from pith to bark. Consequently, it is considered that pore multiple, ray width and axial parenchyma are to be suggested the keys for identification of both species.

Effect of Motor Cues and Secondary Task Complexity on Driving Performance and Task Switching While Driving (운전 중 IVIS 조작 상황에서 Motor Cue와 과제의 난이도가 과제 전환과 운전 주행에 미치는 영향)

  • Ryoo, Eunhyun;Han, Kwanghee
    • Science of Emotion and Sensibility
    • /
    • v.21 no.2
    • /
    • pp.29-42
    • /
    • 2018
  • As information technology is more actively incorporated into automobiles, the role of IVIS (In-Vehicle Infotainment System) is becoming increasingly important for providing convenience and entertainment for drivers. However, using the infotainment systems while driving requires task switching and attending to two visual resources simultaneously. We simulated a setting where participants have to drive while interacting with the infotainment system and examined how task difficulty and motor cues impact driver task-switching and driving performance, specifically whether the effects of motor cues differ depending on task difficulty. For the infotainment display, we used two types of number array depending on the congruency between the digit repetition and the chunking unit, while task difficulty was manipulated by the size of the touch-keys. Participants were instructed to dial two numbers on the screen while we recorded the dialing time, lateral position, inter-key press intervals, and steering wheel control. We found that dialing time and lateral position were affected by task difficulty, while the type of number array had no effect. However, the inter-key press intervals between chunked numbers and steering wheel movement both increased when participants had to use an incongruent number array, which indicates that, if number digits are repeated, chunking is ignored by the drivers. Our findings indicate that, in a dual-task condition, motor cues offset the effect of chunking and can effectively signal the timing for task switching.

Normative Data of The Finger Strength Measured by Keyboard Playing with MIDI : Focusing on Adults (일반 성인의 키보드 연주 손가락 타력 MIDI 표준치 연구)

  • Han, Inhee;Kim, Soo Ji
    • Journal of Music and Human Behavior
    • /
    • v.10 no.2
    • /
    • pp.79-97
    • /
    • 2013
  • The purpose of this study was to obtain the normative data of finger strength using the keyboard and the MIDI(Musical Instrument Digital Interface) software. A total of 92 college students (46 male and 46 female) were recruited from universities located in Seoul and Chungcheong province and an average age was 21.7(SD = 1.8). After the completion of demographic information, each participant asked to press the five keys both in ascending and descending manners with the maximum strength of individual finger. The velocity was obtained as an indicator for finger pressing force by using the MIDI software. Results showed that the individual finger velocity ranged between 77 to 97 (Maximum possible velocity = 127). Regarding male's velocity data, the maximum velocity was found in index finger of dominant hand(96.9), while the minimum strength was found in ring finger of nondominant hand(78.5). Female data appeared to be similar to male's one in terms of maximum strength in dominant index finger(92) and minimum strength in nondominant ring finger(77.5). It also found that the statistically significant differences(p < .05) on finger strength of all fingers between dominant and non-dominant hands except the thumbs(p < .05). The current findings serves as a "normative standard" that proves the validity and effectiveness of hand rehabilitation training program using the electronic keyboard connected with the MIDI software to enhance functional changes in hands.

A Mitochondiral Cytochrome Oxidase I gene based identification of Corbicula ssp. commercially available in South Korea (CO-I 유전자 기반 국내 유통 Corbicula 속 패류의 종 동정)

  • Park, So Young;Kang, Se Won;Hwang, Hee Ju;Chung, Jong Min;Song, Dae Kwon;Park, Hong Seog;Han, Yeon Soo;Lee, Jun-Sang;Kang, Jung-Ha;Lee, Yong Seok
    • The Korean Journal of Malacology
    • /
    • v.32 no.2
    • /
    • pp.127-131
    • /
    • 2016
  • The natives of the genus Corbicula have shown worldwide dispersion in recent times, which has caused great ecological and economic impacts on the introduced ecosystems. The species reported from the genus have been consumed as food and explored for medicine with pharmacological activity. Consequently, the demand of Corbicula sp. in the South Korean domestic market has increased and so also it's associated import to the country. However, due to the absence of identification keys of imported Corbicula, the market is facing confronting situations. We hypothesized that the mitochondrial Cytochrome Oxidase I gene (CO-I) based molecular profiling could be a necessary technique for identification of Corbicula sp. in the South Korea domestic market. The genetic analysis identified both Corbicula japonica and Corbicula fluminea from the market foods. C. japonica and C. fluminea are inhabitants in Korea, but C. fluminea production has decreased in Seomjingang river basin. Therefore, C. fluminea identified from this study, is expected to be imported from China and would have a mixed sales in Seomjingang river side basin.