• Title/Summary/Keyword: 안전블록

Search Result 570, Processing Time 0.027 seconds

Post-Quantum Security Strength Evaluation through Implementation of Quantum Circuit for SIMECK (SIMEC 경량암호에 대한 양자회로 구현 및 Post-Quantum 보안 강도 평가)

  • Song Gyeong Ju;Jang Kyung Bae;Sim Min Joo;Seo Hwa Jeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.6
    • /
    • pp.181-188
    • /
    • 2023
  • Block cipher is not expected to be safe for quantum computer, as Grover's algorithm reduces the security strength by accelerating brute-force attacks on symmetric key ciphers. So it is necessary to check the post-quantum security strength by implementing quantum circuit for the target cipher. In this paper, we propose the optimal quantum circuit implementation result designed as a technique to minimize the use of quantum resources (qubits, quantum gates) for SIMECK lightweight cryptography, and explain the operation of each quantum circuit. The implemented SIMECK quantum circuit is used to check the estimation result of quantum resources and calculate the Grover attack cost. Finally, the post-quantum strength of SIMECK lightweight cryptography is evaluated. As a result of post-quantum security strength evaluation, all SIMECK family cipher failed to reach NIST security strength. Therefore, it is expected that the safety of SIMECK cipher is unclear when large-scale quantum computers appear. About this, it is judged that it would be appropriate to increase the block size, the number of rounds, and the key length to increase the security strength.

Comparative Study of Reliability Design Methods by Application to Donghae Harbor Breakwaters. 1. Stability of Amor Blocks (동해항 방파제를 대상으로 한 신뢰성 설계법의 비교 연구. 1 피복 블록의 안정성)

  • Kim Seung-Woo;Suh Kyung-Duck;Oh Young Min
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.17 no.3
    • /
    • pp.188-201
    • /
    • 2005
  • This is the first part of a two-part paper which describes comparison of reliability design methods by application to Donghae Harbor Breakwaters. This paper, Part 1, is restricted to stability of armor blocks, while Part 2 deals with sliding of caissons. Reliability design methods have been developed fur breakwater designs since the mid-1980s. The reliability design method is classified into three categories depending on the level of probabilistic concepts being employed. In the Level 1 method, partial safety factors are used, which are predetermined depending on the allowable probability of failure. In the Level 2 method, the probability of failure is evaluated with the reliability index, which is calculated using the means and standard deviations of the load and resistance. The load and resistance are assumed to distribute normally. In the Level 3 method, the cumulative quantity of failure (e.g. cumulative damage of armor blocks) during the lifetime of the breakwater is calculated without assumptions of normal distribution of load and resistance. Each method calculates different design parameters, but they can be expressed in terms of probability of failure so that tile difference can be compared among the different methods. In this study, we applied the reliability design methods to the stability of armor blocks of the breakwaters of Donghae Harbor, which was constructed by traditional deterministic design methods to be damaged in 1987. Analyses are made for the breakwaters before the damage and after reinforcement. The probability of failure before the damage is much higher than the target probability of failure while that for the reinforced breakwater is much lower than the target value, indicating that the breakwaters before damage and after reinforcement were under- and over-designed, respectively. On the other hand, the results of the different reliability design methods were in fairly good agreement, confirming that there is not much difference among different methods.

An Indoor Localization and Guidance System for the Visually Impaired Person Based on Bluetooth 4.0 (시각 장애인을 위한 Bluetooth 4.0 기반의 실내 위치 추정 및 안내 시스템)

  • Bae, Sun-Young
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.8
    • /
    • pp.202-208
    • /
    • 2016
  • The scope of activities of the visually impaired is increasing. But they are not easy to visit the destination safely because the building was complicated and larger than ever. There is a guide system for visually impaired such as GPS and Audio alerts, Braille guide block, Acoustic signaller, etc. But they are not suitable for indoor because most of them are the outdoor guide system. Therefore, in this paper, I propose a system that provides guidance information to the visually impaired using Voice Technology, TTS (Text to Speech) and Haptic Technology, Beacon based on the wireless sensor networks. It informed the visually impaired of guidance information about destination such as distance, height, and obstacle to the destination using the generalized smart phone. The user could be received guide info about searches for the optimal route to the destination using the TTS technology and Haptic technology in test result of the proposed system.

A Design and Implementation of the Light-Weight Random Number Generator Using Sensors (센서를 이용한 경량 난수발생기 설계 및 구현)

  • Kang, Hana;Yoo, Taeil;Yeom, Yongjin;Kang, Ju-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.2
    • /
    • pp.307-315
    • /
    • 2017
  • Random number generator(RNG) is essential in cryptographic applications. As recently a system using small devices such as IoT, Sensor Network, SmartHome appears, the lightweight cryptography suitable for this system is being developed. However due to resource limitations and difficulties in collecting the entropy, RNG designed for the desktop computer are hardly applicable to lightweight environment. In this paper, we propose a lightweight RNG to produce cryptographically strong random number using sensors. Our design uses a Hankel matrix, block cipher as the structure and sensors values as noise source. Futhermore, we implement the lightweight RNG in Arduino that is one of the most popular lightweight devices and estimate the entropy values of sensors and random number to demonstrate the effectiveness and the security of our design.

The Risk Analysis and Stability Estimation of Ship Collision Protection of Myodo-Gangyang Suspension Bridge (묘도-광양간 현수교의 선박충돌 방지공의 위험도 분석 및 안정성 평가)

  • Chang, Yong-Chai;Park, Ki-Chul;Kim, Kyung-Taek
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.15 no.2
    • /
    • pp.127-133
    • /
    • 2009
  • The suspension bridge between Myodo and Gwangyang is located in the main navigation channel to Gwangyang Harbor. So, there is need for the collision protection against large vessels. In this paper, the method of risk analysis and non-linear numerical analysis are conducted to consider the ship collision effects. The results of risk analysis, the annual frequency of collapse is more than the acceptable frequency 0.0001. Therefore, as a ship collision protection, island protection with concrete block quay wall is planned. The ship collision force on the pylon is less than the lateral capacity of pylon from the nonlinear numerical analysis.

  • PDF

A Study of Way guide System Design for a Visual Handicapped in School (교육기관 내 시각장애인 목적지안내 시스템 디자인 연구)

  • Lee, Joong-Yeu;Cho, Wan-Sup
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.4
    • /
    • pp.75-82
    • /
    • 2010
  • At this time, our country's social welfare system for the handicapped is switching to increase independence, education is the most important. This study increases the quality of Visual handicapped people's life which have limit to learn and reduces their inconvenience which may occur during their independent school life through the development of the system which helps them safely to reach their destination by themselves using IT technologies in an educational institute which helps their ability to get information and be independent. This study supports Visual handicapped people to move safely by using cell phone which is necessary items for most modern people, RFID tags and white canes with antenna and reader which read the information installed in the raised blocks outside of school buildings and in the hall or aisle inside of buildings and inform the path by voice and vibration.

Mutual Authentication Protocol for Safe Data Transmission of Multi-distributed Web Cluster Model (다중 분산 웹 클러스터모델의 안전한 데이터 전송을 위한 상호 인증 프로토콜)

  • Lee, Kee-Jun;Kim, Chang-Won;Jeong, Chae-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.731-740
    • /
    • 2001
  • Multi-distributed web cluster model expanding conventional cluster system is the cluster system which processes large-scaled work demanded from users with parallel computing method by building a number of system nodes on open network into a single imaginary network. Multi-distributed web cluster model on the structured characteristics exposes internal system nodes by an illegal third party and has a potential that normal job performance is impossible by the intentional prevention and attack in cooperative work among system nodes. This paper presents the mutual authentication protocol of system nodes through key division method for the authentication of system nodes concerned in the registration, requirement and cooperation of service code block of system nodes and collecting the results and then designs SNKDC which controls and divides symmetrical keys of the whole system nodes safely and effectively. SNKDC divides symmetrical keys required for performing the work of system nodes and the system nodes transmit encoded packet based on the key provided. Encryption packet given and taken between system nodes is decoded by a third party or can prevent the outflow of information through false message.

  • PDF

Analysis on the Scour Reduction Effect by Controlling Downflow (하강류 제어를 통한 교각세굴 감소 효과 분석)

  • Lee, Ho Jin;Oh, Hyoun Sik
    • Journal of Korean Society of Disaster and Security
    • /
    • v.11 no.2
    • /
    • pp.61-67
    • /
    • 2018
  • Scour protection methods can be categorized as two types: The first is to reduce the horseshoe and wake vortices which are the main reasons for local scour. Either small cylindrical structures or separated vertical deflectors can be placed in front of the pier or the horizontal deflector (or collar) can be attached to the pier like the spoiler to reduce the dynamics of vortical structures. The second is to employ the protection layer to keep the bed material in place, which is a common method with a merit of immediate effect by using block mat or tetrapod. This study examined the effect of scour reduction using the former method. The relationship between the reflector interval and reduction of scour was not clear. It is assumed that the width of the reflector is somewhat correlated with the reduction of the scour. As the KC numbers increases, the Effect of Scour reduction rate is shown to decrease. Also, Scour reduction rate showed a rapid change at $U_R=25$ or KC = 8.

A Study on primitive polynomial in stream cipher (스트림암호에서 원시다항식에 대한 고찰)

  • Yang, Jeong-mo
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.27-33
    • /
    • 2018
  • Stream cipher is an one-time-pad type encryption algorithm that encrypt plaintext using simple operation such as XOR with random stream of bits (or characters) as symmetric key and its security depends on the randomness of used stream. Therefore we can design more secure stream cipher algorithm by using mathematical analysis of the stream such as period, linear complexity, non-linearity, correlation-immunity, etc. The key stream in stream cipher is generated in linear feedback shift register(LFSR) having characteristic polynomial. The primitive polynomial is the characteristic polynomial which has the best security property. It is used widely not only in stream cipher but also in SEED, a block cipher using 8-degree primitive polynomial, and in Chor-Rivest(CR) cipher, a public-key cryptosystem using 24-degree primitive polynomial. In this paper we present the concept and various properties of primitive polynomials in Galois field and prove the theorem finding the number of irreducible polynomials and primitive polynomials over $F_p$ when p is larger than 2. This kind of research can be the foundation of finding primitive polynomials of higher security and developing new cipher algorithms using them.

  • PDF

On derivation the System Analysis and Evaluation Indicators of Blockchain-based Smart Electronic Transport Waybill Platform for Improvement of Logistics Service Operation Efficiency and Personal Information Security (물류 서비스 운영 효율과 개인정보 보안 향상을 위한 블록체인 기반 스마트 전자 운송장 플랫폼 시스템 분석 및 평가지표 도출에 관한 연구)

  • Park, Jae-Min;Won, JoNg-Woon;Seong, Ki-Deok;Kim, Young-Min
    • Journal of the Korea Safety Management & Science
    • /
    • v.22 no.4
    • /
    • pp.75-86
    • /
    • 2020
  • With the advent of the 4.0 era of logistics due to the Fourth Industrial Revolution, infrastructures have been built to receive the same services online and offline. Logistics services affected by logistics 4.0 and IT technology are rapidly changing. Logistics services are developing using technologies such as big data, artificial intelligence, blockchain, Internet of things, and augmented reality. The convergence of logistics services and various IT new technologies is accelerating, and the development of data management solution technology has led to the emergence of electronic cargo waybill to replace paper cargo waybill. The electronic waybill was developed to supplement paper waybill that lack economical and safety. However, the electronic waybill that appeared to complement the paper waybill are also in need of complementation in terms of efficiency and reliability. New research is needed to ensure that electronic cargo waybill gain the trust of users and are actively utilized. To solve this problem, electronic cargo waybill that combine blockchain technology are being developed. This study aims to improve the reliability, operational efficiency and safety of blockchain electronic cargo waybill. The purpose of this study is to analyze the blockchain-based electronic cargo waybill system and to derive evaluation indicators for system supplementation.