• Title/Summary/Keyword: 마스터 키

Search Result 84, Processing Time 0.022 seconds

Generation and Distribution of Symmetric/Asymmetric Secret Keys for Secure Communications in Koinonia High-rate WPAN (Koinonia 고속 WPAN에서 보안을 위한 대칭/비대칭 비밀 키 교환 방법)

  • Yim Soon-Bin;Jung Ssang-Bong;Lee Tae-Jin;June Sun-Do;Lee Hyeon-Seok;Kwon Tai-Gil;Cho Jin-Woong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.6B
    • /
    • pp.551-560
    • /
    • 2006
  • Security in WPAN is one of the most fundamental issues to overcome the barrier of wireless environment. Although piconet security mechanisms have been defined in the WPAN standards, many remains open and are left for implementation. Koinonia is a high-rate Wireless Personal Area Network (WPAN) technology, and is developed for multimedia traffic transmission in personal area. In Koinonia WPAN, a piconet consists of one master and more than one slave, and piconet security mechanisms is not defined at all. Therefore, we propose a robust piconet security mechanism for secure communications between slaves in a piconet. Based on security requirements analysis, our proposed protocols are shown to meet the security needs for Koinonia high-rate WPAN.

A Cryptoprocessor for AES-128/192/256 Rijndael Block Cipher Algorithm (AES-128/192/256 Rijndael 블록암호 알고리듬용 암호 프로세서)

  • 안하기;박광호;신경욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.257-260
    • /
    • 2002
  • This paper describes a design of cryptographic processor that implements the AES (Advanced Encryption Standard) block cipher algorithm“Rijndael”. To achieve high throughput rate, a sub-pipeline stage is inserted into the round transformation block, resulting that the second half of current round function and the first half of next round function are being simultaneously operated. For area-efficient and low-power implementation the round transformation block is designed to share the hardware resources in encryption and decryption. An efficient scheme for on-the-fly key scheduling, which supports the three master-key lengths of 128-b/192-b/256-b, is devised to generate round keys in the first sub-pipeline stage of each round processing. The cryptoprocessor designed in Verilog-HDL was verified using Xilinx FPGA board and test system. The core synthesized using 0.35-${\mu}{\textrm}{m}$ CMOS cell library consists of about 25,000 gates. Simulation results show that it has a throughput of about 520-Mbits/sec with 220-MHz clock frequency at 2.5-V supply.

  • PDF

Microbial removal of hazardous organic compounds on hazardous waste and contaminated soil (유해환경오염물질의 환경미생물을 이용한 제어연구)

  • 김무훈
    • Proceedings of the Korean Society of Soil and Groundwater Environment Conference
    • /
    • 1997.05a
    • /
    • pp.105-111
    • /
    • 1997
  • 환경에 관한 지식의 증가와 더불어 환경오염을 적극적으로 해결하기 위한 새로운 연구들은 국경을 초월하고 있다 특히, 미국을 비롯한 여러 환경고도기술국가들속의 실험실의 주역들은 <환경 미생물>을 이용한 제어연구에 엄청난 자본과 심혈을 바치고 있다. 실제로 미국 EPA에 의해 이미 유해유기화합물로 규정된 수많은 물질들이 이른바 환경미생물을 이용한 생물학적인 처리를 통해서, 이산화탄소와 물 및 메탄가스등의 무해한 무기화합물로 변환시킬 수 있음이 이미 확증된 바 있다. 아무리 많은 환경미생물들이라 할지라도 그 미생물 군들의 적절한 선택과, 대사작용이 최상의 상태로 유지될 수만 있다면, 환경오염물질들의 생물학적 처리는 개선된 최신방법중의 하나가 될 것이다. 또 이와 같은 미생물을 이용한 각종 처리방법 및 기작의 신개발은 21세기 환경오염문제 해결에 <마스터키> 역할을 감당해 나갈 것으로 기대된다.

  • PDF

A κ-Span Secret Sharing Schem with Exposing Forged Shadows (참가자에게 노출되지 않은 κ-생성 비밀분산방식)

  • Park, Taek-Jin;Won, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.563-568
    • /
    • 2004
  • In the secret sharing scheme, the reconstruction secret must to exposed to participants. In order to enforce the same secret sharing schemes, a new secret have to regenerate and redistribute for participants. Such a regeneration process is inefficient because of the overhead in the regeneration. In this paper, we proposed efficient secret regeneration scheme by eigenvalue. it can be also redistribution without revealing with other participants.

A Hardware Implementation of Ultra-Lightweight Block Cipher PRESENT Supporting Four Modes of Operation (4가지 운영모드를 지원하는 초경량 블록암호 PRESENT의 하드웨어 구현)

  • Kim, Ki-Bbeum;Cho, Wook-Lae;Shin, Kyung-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.151-153
    • /
    • 2016
  • 80/128-비트 마스터키 길이와 ECB, CBC, OFB, CTR의 4가지 운영모드를 지원하는 PRESENT 경량 블록암호 프로세서를 설계하고, Virtex5 FPGA에 구현하여 정상 동작함을 확인하였다. PRESENT 크립토 프로세서를 $0.18{\mu}m$ 공정의 CMOS 셀 라이브러리로 합성한 결과 8,237 GE로 구현되었으며, 최대 434 MHz 클록으로 동작하여 868 Mbps의 성능을 갖는 것으로 예측되었다.

  • PDF

A 7.8Gbps pipelined LEA crypto-processor (7.8Gbps 파이프라인 LEA 크립토 프로세서)

  • Sung, Mi-ji;Shin, Kyung-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.157-159
    • /
    • 2016
  • 3가지 마스터키 길이 128/192/256 비트를 지원하는 파이프라인 LEA(Lightweight Encryption Algorithm) 크립토 프로세서를 설계하였다. 높은 처리율을 얻기 위해 16개의 라운드 스테이지가 파이프라인 방식으로 동작하며, 각 라운드 스테이지는 128비트 데이터패스를 갖도록 설계하였다. 설계된 LEA 프로세서는 FPGA 구현을 통해 하드웨어 동작을 검증하였다. Xilinx ISE로 합성한 결과, 최대 동작주파수 122MHz로 동작하여 7.8Gbps의 성능을 갖는 것으로 평가되었다.

  • PDF

A Practical Authentication System for Wireless Body Area Networks(WBAN) (무선 인체 영역 네트워크(WBAN)를 위한 실용적인 인증 시스템)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Bu, Ki-Dong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.4C
    • /
    • pp.290-296
    • /
    • 2012
  • In this paper, we propose a practical authentication system based on Wireless Body Area Networks(WBAN) for U-healthcare medical information environments. The proposed authentication system is based on symmetric cryptosystem such as AES and is designed to not only provide security such as data secrecy, data authentication, data integrity, but also prevent replay attack by adopting timestamp technique and perform secure authentication between sensor node, master node, base-station, and medical server.

Software Power Analysis Countermeasure using GNU Radio Antenna (GNU Radio를 이용한 소프트웨어적 전력분석 방안)

  • Kim, Tae Yong;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.70-71
    • /
    • 2016
  • General Power Analysis Attack has been investigated by high cost measurement tools and required long term computation process to estimate secrete key. In this paper, effective signal processing technique will be considered by using GNU Radio which can be used to be telecommunication system easily.

  • PDF

Implementation of a Vehicle Monitoring System using Multimodal Information (다중 정보를 활용하는 차량 모니터링 시스템의 구현)

  • Park, Su-Wan;Son, Jun-U
    • Journal of Korean Society of Transportation
    • /
    • v.29 no.3
    • /
    • pp.41-48
    • /
    • 2011
  • In order to detect driver's state in a driver safety system, both overt and covert measures such as driving performance, visual attention, physiological arousal and traffic situation should be collected and interpreted in the driving context. In this paper, we suggest a vehicle monitoring system that provides multimodal information on a broad set of measures simultaneously collected from multiple domains including driver, vehicle and road environment using an elaborate timer equipped as a soft synchronization mechanism. Using a master timer that records key values from various modules with the same master time of short and precise interval, the monitoring system provides more accurate context awareness through synchronized data at any given time. This paper also discusses the data collected from nine young drivers performing a cognitive secondary task through this system while driving.

Development of the PC Based Color Fish Finder (퍼스널 컴퓨터를 이용한 칼라 어군탐지기의 개발에 관한 연구)

  • 신현옥
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.31 no.3
    • /
    • pp.247-255
    • /
    • 1995
  • This paper describes a personal computer(PC) based color fish finder to improve some problem of the commercial one. The commercial fish finder has no function of the echo data logging and replaying. The authors developed two types of the PC based color fish finder. One is a master type composed of a PC, a digital input-output board, and analog to digital converting (A/D) board and an ultrasonic transceiver unit, the other is a slave type composed of a PC and an A/D board. To test the performances of the master type experiments were carried out in air and in a water tank. It is found that the designed master type fish finder displays very well an eight-colored echogram by one dot resolution to the left side of the PC monitor. Also, the depth of echo signal was corresponds very well to the range from the transducer to a target. The sampling interval of echo signal is about 0.1m and the time of A/D conversion is 30 $\mu$sec. On the other hand, to test the performances of the slave type a raw data of echo signals from a data logger was supplied directly or via RF transceivers to the slave type one. From this experiment, it is confirmed the slave type is useful to replay the echo signal from the data logger or a telesounder.

  • PDF