• Title/Summary/Keyword: 중간저장

Search Result 326, Processing Time 0.036 seconds

Study for Balanced Encoding Method against Side Channel Analysis (부채널 분석에 안전한 밸런스 인코딩 기법에 관한 연구)

  • Yoon, JinYeong;Kim, HanBit;Kim, HeeSeok;Hong, SeokHie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1443-1454
    • /
    • 2016
  • Balanced encoding method that implement Dual-rail logic style based on hardware technique to software is efficient countermeasure against side-channel analysis without additional memory. Since balanced encoding keep Hamming weight and/or Hamming distance of intermediate values constantly, using this method can be effective as countermeasure against side channel analysis due to elimination of intermediate values having HW and/or HD relating to secret key. However, former studies were presented for Constant XOR operation, which can only be applied to crypto algorithm that can be constructed XOR operation, such as PRINCE. Therefore, our first proposal of new Constant ADD, Shift operations can be applied to various symmetric crypto algorithms based on ARX. Moreover, we did not used look-up table to obtain efficiency in memory usage. Also, we confirmed security of proposed Constant operations with Mutual Information Analysis.

A Blockchain-Based Content Authentication Scheme for CCN (블록체인 기반 CCN 콘텐츠 인증 기술)

  • Kim, DaeYoub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.975-985
    • /
    • 2018
  • ICN architecture, one of future Internet technologies, proposes that content request packets toward a content source can be responded by several distributed nodes. So, ICN can solve network congestion which is happened around content sources and provide a seamless content distribution service regardless of the network and system statuses of content sources. Especially, CCN implements content caching functionality in network nodes so that such intermediated network nodes can themselves respond to content requests. However, when receiving content from distributed nodes, users receiving content cannot authenticate the nodes providing the content. So CCN is vulnerable to various attacks such as an impersonation attack, a data pollution attack, and so on. This paper first describes CCN content authentication and its weakness. Then it proposes an improved content authentication scheme based on a blockchain and evaluates the performance of the proposed scheme.

Blind Watermarking Using by Multi-wavelet Transform and Binary Image (다중 웨이블릿 변환과 이진영상을 이용한 Blind 워터마킹)

  • Kim, Tae-Ho;Park, Mu-Hun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.413-416
    • /
    • 2005
  • Developement of computer and digitalizing of medical implement are being caused digitalizing of medical image. Medical Images are being managed more by PACS. In this situation comes out many problem about ownership, the right of properity of the medical images and notice wheather the data are modified. Digital watermarking can solve this problem. The proposed schemes have a two weak point that Non-blind method need a original image and Blind method use gaussian watermarking. In this paper, we propose a blind watermarking using binary image in order to easily recognize result of watermark This proposed scheme using wavelet transform and Circular Input method that input in medium-band of frequency domain.

  • PDF

Semi-Fragile Image Watermarking for Authentication Using Wavelet Packet Transform Based on The Subband Energy (부대역 에너지 기반 웨이블릿 패킷 변환을 이용한 인증을 위한 세미 프레자일 영상 워터마킹)

  • Park, Sang-Ju;Kwon, Tae-Hyeon
    • The KIPS Transactions:PartB
    • /
    • v.12B no.4 s.100
    • /
    • pp.421-428
    • /
    • 2005
  • A new method of Semi-fragile image watermarking which ensures the integrity of the contents of digital image is presented. Proposed watermarking scheme embeds watermark in the form of quantization noise on the wavelet transform coefficients in a specific mid frequency subbands selected from a wavelet packet decomposition based on energy distribution of wavelet transform coefficients. By controlling the strength of embedded watermark using HVS (Human Visual System) characteristic, it is imperceptible by a human viewer while robust against non-malicious attack such as compression for storage and/or transmission. When an attack is applied on the original image, it is highly probable that wavelet transform coefficients not only at the exact attack positions but also the neighboring ones are modified. Therefore, proposed authentication method utilizes whether both current coefficient and its neighbors are damaged. together. So it can efficiently detect and accurately localize attacks inflicted on the content of original image. Decision threshold for authentication can be user controlled for different application areas as needed.

A Dynamic Reconfiguration Method using Application-level Checkpointing in a Grid Computing Environment with Cactus and Globus (Cactus와 Globus에 기반한 그리드 컴퓨팅 환경에서의 응용프로그램 수준의 체크포인팅을 사용한 동적 재구성 기법)

  • Kim Young Gyun;Oh Gil-ho;Cho Kum Won;Na Jeoung-Su
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.6
    • /
    • pp.465-476
    • /
    • 2005
  • In this paper, we propose a new dynamic reconfiguration method using application-level checkpointing in a grid computing environment with Cactus and Globus. The existing dynamic reconfiguration methods have been dependent on a specific hardware and operating system. But the proposed method performs a dynamic reconfiguration without supporting specific hardwares and operating systems and, an application is programmed without considering a dynamic reconfiguration. In the proposed method, the job starts with an initial configuration of Computing resources and the job restarts including new resources dynamically found at run-time. The proposed method determines whether to include the newly found idle sites by considering processor performance and available memory of the sites. Our method writes the intermediate results of the job on the disks using system-independent application-level checkpointing for real-time visualization during the job runs. After reconfiguring idle sites and idle processors newly found, the job resumes using checkpointing files. The proposed dynamic reconfiguration method is proved to be valid by decreasing total execution time In K*Grid.

Virtual Machine Code Optimization using Profiling Data (프로파일링 데이터를 이용한 가상기계 코드 최적화)

  • Shin, Yang-Hoon;Yi, Chang-Hwan;Oh, Se-Man
    • The KIPS Transactions:PartA
    • /
    • v.14A no.3 s.107
    • /
    • pp.167-172
    • /
    • 2007
  • VM(Virtual Machine) can be considered as a software processor which interprets the machine code. Also, it is considered as a conceptional computer that consists of logical system configuration. But, the execution speed of VM system is much slower than that of a real processor system. So, it is very important to optimize the code for virtual machine to enhance the execution time. Especially the optimizer for a virtual machine code on embedded devices requires the highly efficient performance to the ordinary optimizer in the respect to the optimized ratio about cost. Fundamentally, functions and basic blocks which influence the execution time of virtual machine is found, and then an optimization for them nay get the high efficiency. In this paper, we designed and implemented the optimizer for the virtual(or abstract) machine code(VMC) using profiling. Firstly, we defined the profiling information which is necessary to the optimization of VMC. The information can be obtained from dynamically executing the machine code. And we implemented VMC optimizer using the profiling information. In our implementation, the VMC is SIL(Standard Intermediate Language) that is an intermediate code of EVM(Embedded Virtual Machine). Also, we tried a benchmark test for the VMC optimizer and obtained reasonable results.

Efficient Prefetching and Asynchronous Writing for Flash Memory (플래시 메모리를 위한 효율적인 선반입과 비동기 쓰기 기법)

  • Park, Kwang-Hee;Kim, Deok-Hwan
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.2
    • /
    • pp.77-88
    • /
    • 2009
  • According to the size of NAND flash memory as the storage system of mobile device becomes large, the performance of address translation and life cycle management in FTL (Flash Translation Layer) to interact with file system becomes very important. In this paper, we propose the continuity counters, which represent the number of continuous physical blocks whose logical addresses are consecutive, to reduce the number of address translation. Furthermore we propose the prefetching method which preloads frequently accessed pages into main memory to enhance I/O performance of flash memory. Besides, we use the 2-bit write prediction and asynchronous writing method to predict addresses repeatedly referenced from host and prevent from writing overhead. The experiments show that the proposed method improves the I/O performance and extends the life cycle of flash memory. As a result, proposed CFTL (Clustered Flash Translation Layer)'s performance of address translation is faster 20% than conventional FTLs. Furthermore, CFTL is reduced about 50% writing time than that of conventional FTLs.

Analysis of Waiting Time and its Associated Factors at School Lunch Room Using Ultrasonic and Noise Sensors (초음파와 소음 감지 센서를 이용한 학교 급식실 대기 시간과 연관 요소 분석)

  • Jung, Jimin;Shin, Yebin;Lee, Eunji;Kim, Jieun
    • Annual Conference of KIPS
    • /
    • 2019.10a
    • /
    • pp.312-315
    • /
    • 2019
  • 본 연구는 아두이노 보드와 다중 센서들을 사용하여 학교 급식실 대기 공간에서의 대기 상황을 분석한다. 실험에 사용한 초음파 및 소음 감지 센서들로부터 초음파 및 소음 데이터를 입력 받아 송신하는 아두이노 보드 기반 프로그램을 작성하고, 데이터를 수집, 저장, 관리하기 위하여 CoolTerm 프로그램을 사용한다. 또한, C 언어를 기반으로 정규화 프로그램과 필터링 프로그램을 구현하여 대기 인원 감지라고 인정할 수 있는 조건(일정 소음 이상 발생, 초당 5회 이상 감지 및 3미터 미만 거리에서 감지)에 맞지 않는 데이터를 걸러낸다. 예비 실험 이후 실시한 본 실험 범위는 8월 27일(화)부터 30일(금)까지 4일간, 점심 식사 시간 중 중간 시간대인 12시 20분부터 12시 39분까지이다. 분석 결과 식단 선호도에 따라 대기 시간에 확연한 차이가 발생하는 것을 확인하였으며, 배식 시간 역시 대기 시간에 미치는 영향이 있는 것을 알 수 있었다. 또한 초음파 센서로부터 분석한 결과와 소음 감지 센서로부터 분석한 결과, 상당한 유사성이 관찰되었다. 본 연구는 대기 시간만의 측정에 그치는 것이 아니라, 식단과 대기 시간과의 관계 분석을 통해 학생 식사 행태가 대기 시간에도 영향을 미친다는 추가적인 사실을 증명하였는데, 이는 대기 시간 문제 해결이 단순히 급식 대기 상황 개선에만 있는 것이 아니라 식단 및 배식 방식 등의 개선과 같이 이루어져야 함을 보여준다. 이는 기존 연구들이 확인하지 못했던 사실로, 본 연구의 주요한 기여로 볼 수 있다. 향후 본 연구를 확대하여 무선 인터넷 및 알림 시설을 갖춘다면, 현재의 학교 급식 환경을 획기적으로 개선할 수 있을 것으로 기대한다.

Design and Estimation of Cordless Transmitter & Receiver for Measurement of Crane Moving Range (크레인의 이동거리 측정을 위한 무선 송수신기 설계 및 평가)

  • Kim, Tae-Soo;Oh, Inn-Yeal;Chun, Joong-Chang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.4
    • /
    • pp.808-814
    • /
    • 2007
  • In this paper, the measurement system of crane moving range is concerned with range recognition technology using phase and magnitude of radio wave. By the proposed technology, we design the radio transmitter and receiver and realize the measurement system, and save the data in disk that is earned from 900Mhz RF signal, middle frequency 450khz of analog signal. As a result of RF measurement, we got 9.3 dBm of RF output and 96 dBc@10khz of phase noise. Range information is earned the data through digital signal processing of IF signal. For the estimation of range measured, we analyze the difference between real range and measurement range, and also suggest the method to remove the measurement error using average processing and amplitude properties. A result is 0.12 and 0.00422 deviation in l0mn-30m and within 5m respectively, and then 2.4E-04 deviation in 4m by using compensation of level characteristics lately.

Research on the Dispersion Stability and Scale up of Carbon Slurry Fuel (카본슬러리 연료의 분산안정성 개선 및 scale up 제조연구)

  • Jo, Min-Ho;Yang, Mun-Kyu;Lee, Ik-Mo;Cho, Joon-Hyun;Kwon, Tae-Soo;Jeong, Byung-Hun;Han, Jeong-Sik
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2008.11a
    • /
    • pp.459-462
    • /
    • 2008
  • In manufacture of slurry fuel, the effects of process parameters on the carbon dispersion stability have been investigated. The particle size and contents of the carbon slurry taken from 3 (top, medium, bottom) positions in fuel reservoir were analyzed to estimate the dispersion of the carbon in Jet A-1. Through the application of various additives, it was found that NB463S84 additive showed the best dispersion and stability of carbon at accelerated gravity condition. The mixer performance was compared by the observation of height change of carbon-containing layer and measurement of particle sizes at the same conditions. Application of the mixing conditions obtained from the lab-scale to bench scale manufacture confirmed the practical feasibility of our research.

  • PDF