• Title/Summary/Keyword: 그룹 복호

Search Result 63, Processing Time 0.037 seconds

A Study on Key Distribution Using Broadcast Encryption for Ad-hoc Environment (Ad-hoc 환경에서 브로드캐스트 암호화 기법을 이용한 키 분배에 관한 연구)

  • Lee, Deok-Gyu;Lee, Im-Yeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11c
    • /
    • pp.1855-1858
    • /
    • 2003
  • 브로드캐스트 암호화 기법은 공개된 네트워크 상에서 멀티미디어, 소프트웨어, 유료 TV 등의 디지털 정보들을 전송하는데 적용되고 있다. 브로드캐스트 암호화 기법에서 중요한 것은 오직 사전에 허가된 사용자만이 디지털 정보를 얻을 수 있어야 한다는 것이다. 브로드캐스트 메시지가 전송되면 권한이 있는 사용자들은 자신이 사전에 부여받은 개인키를 이용하여 먼저 세션키를 복호화하고 이 세션키를 통하여 디지털 정보를 얻게 된다. 이와 같이 사용자는 브로드캐스터가 전송하는 키를 이용하여 메시지나 세션키를 획득하게 되는데, 이러한 과정에서 브로드캐스터가 키를 생성하고 분배하는 과정이 필요하다. Ad-hoc 통신망은 기반구조 없이 각 무선 호스트들 사이에 대하여 전송이 가능하고, 잦은 위치 변화에 따라 망구조가 유동적으로 변하는 특성으로 인해 PKI와 같은 기반구조를 적용하기 힘들다. 이에 본 논문에서는 Ad-hoc 네트워크에 적용하여 회의장 등과 같은 특정한 공간에서 Ad-hoc 통신망을 구성할 수 있는 무선 호스트를 사용하여 소규모 그룹의 회의하고자 할 경우를 고려하여 쉬운 키 생성과 키 갱신을 하도록 제안하였다.

  • PDF

Authentication Mechanism for Power Line Communication System (전력선 통신 시스템을 위한 인증 메커니즘)

  • Heo, Joon;Hong, Choong-Seon;Ju, Sung-Ho;Lim, Yong-Hun;Lee, Bum-Suk;Hyun, Duck-Hwa
    • Proceedings of the KIEE Conference
    • /
    • 2007.07a
    • /
    • pp.1189-1190
    • /
    • 2007
  • 지금까지 국내 PLC 기술의 경우 그룹식별자(GID)를 키로 사용하는 암호화/복호화를 통해 보안 기능을 제공하고 있다. 그러나, 이러한 방법의 경우 동일한 셀(Cell)에 존재하는 PLC장비들이 동일한 키를 사용하게 된다. 따라서, 공격자는 GID를 획득함으로써 동일한 셀에 존재하는 모든 장비들의 정보를 획득하거나 조작할 수 있다. 이러한 문제가 발생하는 가장 큰 원인은 두 가지로 정리할 수 있다. 첫째, PLC 장비간 인증절차를 거치지 않는 것이다. 둘째, 단순 식별자를 암호화를 위한 보안키로 사용한다는 것이다. 따라서 본 논문은 한국산업규격(KSX 4600-1)의 매체접근제어(MAC)계층에서 정의하고 있는 기술을 근거로 PLC 장비간 인증 및 보안키 생성 메커니즘을 제안하고, 그에 따른 프레임 형식 및 동작과정을 제안한다.

  • PDF

Design of New Quasi-Orthogonal Space-Time Block Code with Minimum Decoding Complexity (최소 복호 복잡도를 갖는 새로운 준직교 시중간블록부호 설계)

  • Chae, Chang-Hyeon;Choi, Dae-Won;Jung, Tae-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12A
    • /
    • pp.1219-1225
    • /
    • 2007
  • In this paper, we propose a new quasi-orthogonal space-time block code(QO-STBC) achieving full rate and full diversity for general QAM and quasi-static Rayleigh fading channels with four transmit antennas. This code possesses the quasi orthogonal property like the conventional minimum decoding complexity QO-STBC(MDC-QO-STBC), which allows independently a maximum likelihood(ML) decoding to only require joint detection of two real symbols. By computer simulation results, we show that the proposed code exhibits the identical BER performance with the existing MDC-QO-STBC. However, the proposed code has an advantage in the transceiver implementation since the original coding scheme may be modified so that increases of peak-to-average power ratio occur at only two transmit antennas, but the MDC-QO-STBC does at all of transmit antennas.

A Query Result Integrity Assurance Scheme Using an Order-preserving Encryption Scheme in the Database Outsourcing Environment (데이터베이스 아웃소싱 환경에서 순서 보존 암호화 기법을 이용한 질의 결과 무결성 검증 기법)

  • Jang, Miyoung;Chang, Jae Woo
    • Journal of KIISE
    • /
    • v.42 no.1
    • /
    • pp.97-106
    • /
    • 2015
  • Recently, research on database encryption for data protection and query result authentication methods has been performed more actively in the database outsourcing environment. Existing database encryption schemes are vulnerable to order matching and counting attack of intruders who have background knowledge of the original database domain. Existing query result integrity auditing methods suffer from the transmission overhead of verification object. To resolve these problems, we propose a group-order preserving encryption index and a query result authentication method based on the encryption index. Our group-order preserving encryption index groups the original data for data encryption and support query processing without data decryption. We generate group ids by using the Hilbert-curve so that we can protect the group information while processing a query. Finally, our periodic function based data grouping and query result authentication scheme can reduce the data size of the query result verification. Through performance evaluation, we show that our method achieves better performance than an existing bucket-based verification scheme, it is 1.6 times faster in terms of query processing time and produces verification data that is 20 times smaller.

Mediated ID based signature scheme and key updating signature scheme (중재자를 이용한 ID기반 전자서명과 키 업데이팅 전자서명 기법)

  • Ju, Hak-Soo;Kim, Dae-Youb
    • The KIPS Transactions:PartC
    • /
    • v.14C no.6
    • /
    • pp.463-470
    • /
    • 2007
  • Revocation is one of the main difficulties faced in implementing Public Key Infrastructures(PHs). Boneh, Ding and Tsudik first introduced a mediated cryptography for obtaining immediate revocation of RSA keys used in PKIs. Their method is based on the idea that each user's private key can be split into two random shares, one of which is given to the user and the other to an online security mediator(SEM). Thus any signature or decryption must be performed as a cooperation between a user and his/her associated SEM and revocation is achieved by instructing the mediator SEM to stop cooperating the user. Recently, Libert and Quisquater showed that the fast revocation method using a SEcurity Mediator(SEM) in a mRSA can be applied to the Boneh-Franklin identify based encryption and GDH signature schemes. In this paper we propose a mediated identity based signature(mIBS) with batch verification which apply the SEM architecture to an identity based signature. Libert's GDH siganture scheme is not forward secure even though forward security is an important and desirable feature for signature schemes. We propose an efficient key udating mediated signature scheme, mKUS based on mIBS and analyze its security and efficiency.

A Hierarchical Group-Based CAVLC Decoder (계층적 그룹 기반의 CAVLC 복호기)

  • Ham, Dong-Hyeon;Lee, Hyoung-Pyo;Lee, Yong-Surk
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.2
    • /
    • pp.26-32
    • /
    • 2008
  • Video compression schemes have been developed and used for many years. Currently, H.264/AVC is the most efficient video coding standard. The H.264/AVC baseline profile adopts CAVLC(Context-Adaptive Variable Length Coding) method as an entropy coding method. CAVLC gives better performance in compression ratios than conventional VLC(Variable Length Coding). However, because CAVLC decoder uses a lot of VLC tables, the CAVLC decoder requires a lot of area in terms of hardware. Conversely, since it must look up the VLC tables, it gives a worse performance in terms of software. In this paper, we propose a new hierarchical grouping method for the VLC tables. We can obtain an index of codes in the reconstructed VLC tables by simple arithmetic operations. In this method, the VLC tables are accessed just once in decoding a symbol. We modeled the proposed algorithm in C language, compiled under ARM ADS1.2 and simulated it with Armulator. Experimental results show that the proposed algorithm reduces execution time by about 80% and 15% compared with the H.264/AVC reference program JM(Joint Model) 10.2 and the arithmetic operation algorithm which is recently proposed, respectively.

Characterization of Uniform/Hybrid Complemented Group Cellular Automata with Rules 195/153/51 (전이규칙 195,153,51을 갖는 Uniform/Hybrid 여원 그룹 셀룰라 오토마타의 특성화)

  • Hwang, Yoon-Hee;Cho, Sung-Jin;Choi, Un-Sook;Kim, Seok-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.315-318
    • /
    • 2005
  • Recently, the advent of wireless communication and other handhold devices like Personal Digital Assistants and smart cards have made in implementation of cryptosystems a major issue. One important aspect of modern day ciphers is the scope for hardware sharing between the encryption and decryption algorithm. The cellular Automata which have been proposed as an alternative to linear feedback shift registers(LFSRs) can be programmed to perform the operations without using any dedicated hardware. But to generalize and analyze CA is not easy. In this paper, we characterizes uniform/hybird complemented group CA with rules 195/153/51 that divide the entire state space into smaller spaces of maximal equal lengths. This properties can be useful in constructing key agreement algorithm.

  • PDF

A Study on Error Resilience of Header Parameters considering the activity of macroblock (매크로블록의 활동성을 고려한 헤더정보의 오류 복원에 관한 연구)

  • Kim, Jong-Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.5
    • /
    • pp.837-842
    • /
    • 2008
  • Any errors that are generated in the channels and networks distort the video quality and are propagated in both the spatial and temporal domains. In particular, header errors ran result in serious visual degradation of the output video encoding/decoding schemes that can make an error resilient compressed bit-stream in error prone environments, such as mobile networks. In this paper, we proposes an header error resilience method that consider the activity of macroblock in video bitstream syntex. The extract of header error repaetedly embeds the header parameters into the least significant bits(LSB) of the quantized DCT coefficients prior to VLC. Experimental results show that the proposed error resilience method restores good image quality despite the detected error on header parameters.

Quality Improvement of Low-Bitrate HE-AAC Encoder (HE-AAC 부호화의 저비트율에서 음질향상 기법)

  • Kim, Jeong-Geun;Lee, Jae-Seong;Lee, Tae-Jin;Kang, Kyeong-Ok;Park, Young-Cheol
    • The Journal of the Acoustical Society of Korea
    • /
    • v.27 no.2
    • /
    • pp.66-74
    • /
    • 2008
  • In this paper, we propose new techniques that can improve the quality of AAC and SBR encoders comprised in low bitrate HE-AAC. To reduce the pre-echo artifacts often occurring for transient blocks in AAC, we propose an extended Temporal Noise Shaping (sTNS) in which the frequency range is selectively extended down to the low-frequency region. Also, for he high-frequency region being coded by SBR encoder, tones are identified through a sinusoidal modeling and their frequencies are adjusted within the QMF band in order to reduce the noise floor due to aliasing. Spectrograms of the decoded signals were compared and listening tests were conducted to evaluate the proposed algorithm. Results confirmed the effectiveness of the proposed algorithm.

Performance Analysis and MODEM Implementation of the HDR-WPAN System (HDR-WPAN 시스템의 모뎀 구현 및 성능분석)

  • Ju, Won-Ki;Kim, Yoon-Ho
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.1
    • /
    • pp.97-103
    • /
    • 2009
  • In this paper, the structure and detailed specifications of the HDR-WPAN physical layer have been analyzed and the block module of transmitter and receiver have been also designed, and analyzed the performance as well. In the process of transmitter design, it concentrated on all possibility of modulation of QPSK, DQPSK and 16/32/64QAM-TCM, which could be available for mode selection due to the transmission rate. In addition to the receiver module, DQPSK and TCM decoding algorithm is mainly concerned. After designing the transceiver MODEM using VHDL, we have programmed on the platform board and verified the functions of the MODEM. Some experimental results showed that it can be considered a possibility of data communication without error over SNR 22dB.

  • PDF