• Title/Summary/Keyword: 선형공격

Search Result 104, Processing Time 0.031 seconds

지상 전술 $C^4I$체계의 위치보고체계 구축을 위한 제대간 데이터 통신망 구성 방안

  • Kim, Yong-Yun
    • Defense and Technology
    • /
    • no.2 s.252
    • /
    • pp.46-57
    • /
    • 2000
  • 군 통신도 앞으로 상용에서의 이동통신 시스템이나 ATM(Asynchronous Transfer Mode), 위성통신과 같은 첨단 통신방식으로 발전하는 추세에 있으므로 전술제대 단위로 위치보고체계의 통신망을 구성한다면 상호운용성(Interoperability)면에서 중대한 문제점이 발생할 수 있다. 한편 장차전의 양상은 화력전, 입체 고속 기동전으로 가는 추세이며 기갑/기계화부대는 비선형 기동전의 주역으로서 적의 취약점을 포착하는 즉시 민첩한 기동전투력으로 종심공격을 실시하여 적에게 불리한 비선형의 전장을 적극적으로 조성하고 주도권을 행사하는 전술작전 능력을 발휘한다

  • PDF

Credential Forging Attack against Privacy Enhancing Credential System in Nakazato-Wang-Yamamura '07 (Nakazato-Wang-Yamamura '07의 프라이버시가 강화된 크레덴셜 시스템에 대한 크레덴셜 위조 공격)

  • Nyang, Dae-Hun;Lee, Kyung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.195-199
    • /
    • 2008
  • We present an attack which forges a credential without the help of the credential issuer in the protocol designed by Nakazato, Wang and Yamamura at ASIAN 2007 The attack avoids using the credential issuer's private key by taking advantage of the property of bilinear pairing. Implication of this collusion attack by user and verifiers also discussed.

Effects of Abuse, Neglect, and Excessive Interference of Parents on Adolescent Aggression: Moderating Effect of Playing Computer Game (부모의 학대, 방임, 과잉간섭이 청소년 자녀의 공격성에 미치는 영향: 컴퓨터 게임 이용빈도의 조절효과)

  • Lee, Jinhee
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.5
    • /
    • pp.330-342
    • /
    • 2018
  • The purpose of this study was to investigate effects of abuse, neglect, and excessive interference of parents on adolescent aggression in the longitudinal context and examine the moderating effect of playing computer game theoretically guided by the flow theory. 2,351 adolescents from the Korean Children & Youth Panel Survey was analyzed using Linear Mixed Effects Regression procedures. Primary findings are as follows: (1) adolescents with higher level of abuse or excessive interference showed higher level of aggression. (2) the aggression level of adolescents with higher level of abuse or excessive interference consistently decreased over time. (3) the link between abuse and aggression was significantly moderated by playing computer game. In conclusion, the negative effect of the abuse on adolescent aggression could be significantly decreased by playing computer game.

A Study on a Variable P box Generation Using a DES Key Expansion (DES 키 확장을 이용한 가변 P box 생성에 관한 연구)

  • Lee, Jun
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.287-292
    • /
    • 2011
  • Using an expanded DES key, we suggest a block cipher algorithm to generate and to use a variable P box. We also present an efficient way for the implementation of variable P box at each round. Using counter examples on Differential Cryptanalysis(DC) and Linear Cryptanalysis(LC), we show that the suggested algorithm is strong enough to overcome those attacks. Compared with the real key bits of triple DES(3DES), the new algorithm is much safer in the points of the exhaustive attack. The results of computer simulations show that the new algorithm is almost 3 times faster than 3DES regarding the cipher process time.

MILP-Aided Division Property and Integral Attack on Lightweight Block Cipher PIPO (경량 블록 암호 PIPO의 MILP-Aided 디비전 프로퍼티 분석 및 인테그랄 공격)

  • Kim, Jeseong;Kim, Seonggyeom;Kim, Sunyeop;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.875-888
    • /
    • 2021
  • In this paper, we search integral distinguishers of lightweight block cipher PIPO and propose a key recovery attack on 8-round PIPO-64/128 with the obtained 6-round distinguishers. The lightweight block cipher PIPO proposed in ICISC 2020 is designed to provide the efficient implementation of high-order masking for side-channel attack resistance. In the proposal, various attacks such as differential and linear cryptanalyses were applied to show the sufficient security strength. However, the designers leave integral attack to be conducted and only show that it is unlikely for PIPO to have integral distinguishers longer than 5-round PIPO without further analysis on Division Property. In this paper, we search integral distinguishers of PIPO using a MILP-aided Division Property search method. Our search can show that there exist 6-round integral distinguishers, which is different from what the designers insist. We also consider linear operation on input and output of distinguisher, respectively, and manage to obtain totally 136 6-round integral distinguishers. Finally, we present an 8-round PIPO-64/128 key recovery attack with time complexity 2124.5849 and memory complexity of 293 with four 6-round integral distinguishers among the entire obtained distinguishers.

On the Security of Rijndael-like Structures against Differential and Linear Cryptanalysis (Rijndael 유사 구조의 차분 공격과 선형 공격에 대한 안전성에 관한 연구)

  • 박상우;성수학;지성택;윤이중;임종인
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.5
    • /
    • pp.3-14
    • /
    • 2002
  • Rijndael-like structure is the special case of SPN structure. The linear transformation of Rijndael-like structure consisits of linear transformations of two types, the one is byte permutation $\pi$ and the other is linear tranformation $\theta$= ($\theta_1, \theta_2, \theta_3, \theta_4$), where each of $\theta_i$ separately operates on each of the four rows of a state. The block cipher, Rijndael is an example of Rijndael-like structures. In this paper. we present a new method for upper bounding the maximum differential probability and the maximum linear hull probability for Rijndael-like structures.

Collision Attack of a Hash Function based on 2D Cellular Automata (이차원 셀룰라 오토마타 기반 해쉬함수에 대한 충돌쌍 공격)

  • Choi, Joon-Geun;Ryu, Han-Seong;Lee, Je-Sang;Hong, Seok-Hie
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2008.02a
    • /
    • pp.81-84
    • /
    • 2008
  • 김재겸은 2005년 한국 멀티미디어 학회 논문지에 새로운 이차원 셀룰라 오토마타 설계 방법을 소개하고 이 설계 방법으로 구성된 이차원 셀룰라 오토마타를 이용한 해쉬함수를 제안하였다. 본 논문에서는 이 해쉬함수에 대한 첫 번째 분석 결과를 소개한다. 이 해쉬함수는 8 라운드로 구성되고 한 라운드는 두 개의 비선형 연산 부분을 포함하고 있으며, 메시지는 두 비선형 연산 부분에 모두 사용된다. 메시지 차분이 비선형 연산 부분을 거친 뒤 사라질 확률은 $2^{-14}$이다. 따라서 1 라운드 후 약 $2^{-28}$의 확률로 이 해쉬함수의 충돌쌍을 찾을 수 있다. 본 논문의 분석 결과를 통하여 이 해쉬함수는 매우 취약함을 알 수 있다.

  • PDF

An Adversarial Attack Type Classification Method Using Linear Discriminant Analysis and k-means Algorithm (선형 판별 분석 및 k-means 알고리즘을 이용한 적대적 공격 유형 분류 방안)

  • Choi, Seok-Hwan;Kim, Hyeong-Geon;Choi, Yoon-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1215-1225
    • /
    • 2021
  • Although Artificial Intelligence (AI) techniques have shown impressive performance in various fields, they are vulnerable to adversarial examples which induce misclassification by adding human-imperceptible perturbations to the input. Previous studies to defend the adversarial examples can be classified into three categories: (1) model retraining methods; (2) input transformation methods; and (3) adversarial examples detection methods. However, even though the defense methods against adversarial examples have constantly been proposed, there is no research to classify the type of adversarial attack. In this paper, we proposed an adversarial attack family classification method based on dimensionality reduction and clustering. Specifically, after extracting adversarial perturbation from adversarial example, we performed Linear Discriminant Analysis (LDA) to reduce the dimensionality of adversarial perturbation and performed K-means algorithm to classify the type of adversarial attack family. From the experimental results using MNIST dataset and CIFAR-10 dataset, we show that the proposed method can efficiently classify five tyeps of adversarial attack(FGSM, BIM, PGD, DeepFool, C&W). We also show that the proposed method provides good classification performance even in a situation where the legitimate input to the adversarial example is unknown.

DPA-Resistant Logic Gates and Secure Designs of SEED and SHA-1 (차분 전력분석 공격에 안전한 논리 게이트 및 SEED 블록 암호 알고리즘과 SHA-1 해쉬 함수에의 응용)

  • Baek, Yoo-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.17-25
    • /
    • 2008
  • The differential power attack (DPA)[8] is a very powerful side-channel attack tool against various cryptosystems and the masking method[10] is known to be one of its algorithmic countermeasures. But it is non-trivial to apply the masking method to non-linear functions, especially, to arithmetic adders. This paper proposes simple and efficient masking methods applicable to arithmetic adders. For this purpose, we use the fact that every combinational logic circuit (including the adders) can be decomposed into basic logic gates (AND, OR, NAND, NOR, XOR, XNOR, NOT) and try to devise efficient masking circuits for these basic gates. The resulting circuits are then applied to the arithmetic adders to get their masking algorithm. As applications, we applied the proposed masking methods to SEED and SHA-1 in hardware.

The Effect of Factors on Aggression in Adolescents: Focusing on Individual, Parent, Friend Factors and SNS Usage (청소년의 공격성에 영향을 미치는 요인: 개인·부모·친구 요인과 소셜네트워크서비스(SNS) 이용 정도를 중심으로)

  • Lee, Yejin;Kim, Kyong-Beom;Heo, Min-Hee;Noh, Jin-Won;Im, Yu-Mi
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.4
    • /
    • pp.699-706
    • /
    • 2021
  • This study aims to identify the effects of factors on aggression in adolescents, focusing on the individual, parent, friend factors and SNS usage. In particular, this study is to provide a basis for easing aggression in adolescence by considering the emotional relationship of parents and friends. This study analyzed frequency, t-test, one-way batch distribution analysis(ANOVA), and multi-linear regression, using the data from the 7th year of the Korean Children and Youth Panel Survey. As a result, adolescents who frequently use SNS are more aggressive than adolescents who use less. Among the parental factors, the more abuse and excessive interference were found to be more aggressive, and the higher the coach, the lower the aggressiveness. Furthermore, among the friend factors, it has been shown that the higher the alienation, the more aggressive adolescents are. In order to reduce aggression among adolescents, it is necessary to prepare an integrated program considering the emotional relationship of parents and friends, who are the most influential neighbors, rather than simply restricting the use of SNS.