• Title/Summary/Keyword: 체크섬

Search Result 15, Processing Time 0.055 seconds

Two-Dimensional Checksum for Two-Dimensional Codes (이차원 코드를 위한 이차원 체크섬)

  • Ahn, Jae-Won
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.151-153
    • /
    • 2005
  • 체크섬은 에러검출의 우수성 때문에 TCP등에서 널리 사용하고 있다. 이 체크섬 방식은 연산이 간단하고 빠르나, 미검출 에러가 생기는 경우가 있기 때문에 여러 다른 형태의 체크섬 방식등이 연구가 진행되고 있고 각 방식에 성능과 효율면에서 상관관계가 있어 어플리케이션에따라 선택에 어려움이 있는 경우가 있다. 이에 저자는 새로운 개념인 이차원 체크섬이라는 방식을 제안하고자 한다. 알고리즘이 단순하면서도 기존의 체크섬의 미검출 에러의 문제를 현저하게 줄일 수 있고 비용-이득 스펙트럼상에서 매우 효과적이고 효율적이다.

  • PDF

Design of RISC-based Transmission Wrapper Processor IP for TCP/IP Protocol Stack (TCP/IP프로토콜 스택을 위한 RISC 기반 송신 래퍼 프로세서 IP 설계)

  • 최병윤;장종욱
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.6
    • /
    • pp.1166-1174
    • /
    • 2004
  • In this paper, a design of RISC-based transmission wrapper processor for TCP/IP protocol stack is described. The processor consists of input and output buffer memory with dual bank structure, 32-bit RISC microprocessor core, DMA unit with on-the-fly checksum capability, and memory module. To handle the various modes of TCP/IP protocol, hardware-software codesign approach based on RISC processor is used rather than the conventional state machine design. To eliminate large delay time due to sequential executions of data transfer and checksum operation, DMA module which can execute the checksum operation along with data transfer operation is adopted. The designed processor exclusive of variable-size input/output buffer consists of about 23,700 gates and its maximum operating frequency is about 167MHz under 0.35${\mu}m$ CMOS technology.

Parallel Processing Architecture for Parity Checksum Generator Complying with ITU-T J.83 ANNEX B (ITU-T J.83 ANNEX B의 Parity Checksum Generator를 위한 병렬 처리 구조)

  • Lee, Jong-Yeop;Hong, Eon-Pyo;Har, Dong-Soo;Lim, Hai-Jeong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.6C
    • /
    • pp.619-625
    • /
    • 2009
  • This paper proposes a parallel architecture of a Parity Checksum Generator adopted for packet synchronization and error detection in the ITU-T Recommendation J.83 Annex B. The proposed parallel processing architecture removes a performance bottleneck occurred in a conventional serial processing architecture, leading to significant decrease in processing time for generating a Parity Checksum. The implementation results show that the proposed parallel processing architecture reduces the processing time by 83.1% at the expense of 16% area increase.

Modified TCP with Post-Checksum Field and Limited Error Control Algorithm for Memory-limited Tiny Sensor Node (메모리 크기 제약이 있는 센서 노드에서의 포스트 체크섬과 제한된 오류제어 알고리즘 연구)

  • Oh, Jong-Taek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.141-145
    • /
    • 2012
  • In a Ubiquitous sensor network environment, the sensor node is in general small and low price, and operating with power limited battery. The reliable TCP/IP protocol is used for transmitting sensed data from the sensor node. A new method was proposed in order to overcome the limitation of small embedded memory, but it is difficult to use for the case of frame error. In this paper, a new algorithm is proposed to manage the receiving frame error or loss, and it is appropriate to the sensor network to send sensed data periodically.

The Design of a Secure Patch Distribution Architecture (안전한 패치 분배 구조 설계)

  • 손태식;김진원;박일곤;문종섭;서정택;임을규;이철원
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10c
    • /
    • pp.559-561
    • /
    • 2002
  • 시스템이나 네트워크 보안에 있어 관련된 페치의 업데이트는 보안의 최우선적 사항이다. 그러므로 패치 분배과정에 있어 패치 정보가 누출된다는 것은 시스템이나 네트워크의 취약성이 그대로 노출되는 것과 같은 문제를 발생시킨다. 본 논문에서는 일반적인 인터넷 환경에서의 패치 분배가 아닌 특정 조직이나 기관의 도매인 내부에서 안전하게 패치를 분배할 수 있는 구조에 대하여 제안한다. 본 제안 구조에서는 서버 인증서 기반의 사용자 인증, SKIP 모듈러스를 사용하는 DH 키분배, 패치 체크섬 암호화를 통한 기밀성ㆍ무결성 보장, 원격지에서의 패치 자동 설치 기능을 제공한다.

  • PDF

A Practical Design and Implementation of Android App Cache Manipulation Attacks (안드로이드 앱 캐시 변조 공격의 설계 및 구현)

  • Hong, Seok;Kim, Dong-uk;Kim, Hyoungshick
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.205-214
    • /
    • 2019
  • Android uses app cache files to improve app execution performance. However, this optimization technique may raise security issues that need to be examined. In this paper, we present a practical design of "Android app cache manipulation attack" to intentionally modify the cache files of a target app, which can be misused for stealing personal information and performing malicious activities on target apps. Even though the Android framework uses a checksum-based integrity check to protect app cache files, we found that attackers can effectively bypass such checks via the modification of checksum of the target cache files. To demonstrate the feasibility of our attack design, we implemented an attack tool, and performed experiments with real-world Android apps. The experiment results show that 25 apps (86.2%) out of 29 are vulnerable to our attacks. To mitigate app cache manipulation attacks, we suggest two possible defense mechanisms: (1) checking the integrity of app cache files; and (2) applying anti-decompilation techniques.

Efficient TCP/IP Transmission Technology in Wireless Sensor Network for ITS Applications (ITS용 무선센서네트워크에서 효율적인 TCP/IP 전송기술)

  • Oh, Jong-Taek
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.1
    • /
    • pp.76-81
    • /
    • 2009
  • The transmitting node in WSN for ITS would be small and operated by battery, and the MCU in the node would be low speed with small sized memory and low power consumption. In this paper, the post-checksum method in which the checksum field is added to the tail of the TCP segment for ITS applications, is proposed to reduce data processing time and power consumption, and so there is no limitation of the transmitting data size.

  • PDF

Performance Evaluation of Cryptographic Algorithms for the 6LoWPAN with Packet Fragmentations (6LoWPAN 단편화 패킷 재전송에 따른 암호화 알고리즘 성능 분석)

  • Kim, Hyun-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.8
    • /
    • pp.77-84
    • /
    • 2011
  • In this paper we implement a 6LoWPAN protocol on the MICAz sensor platform, which could minimize packet re-transmission, and support security primitives for packet integrity and confidentiality. And we also present a performance evaluation of the implemented protocol calculated according to the cryptographic algorithms. In the re-transmission method, time stamp, nonce, and checksum are considered to protect replay attacks. As cryptographic algorithms, AES, 3DES, SHA2, and SHA1 are implemented. If transmission errors (thus, packet losses) and the number of hops are increase then, packet re-transmissions are increase exponentially from the experimental results. Also, the result shows that cryptographic operations take more time than packet re-transmission time.

A Case Study on the Modernization of Traditional Brands, 'Burberry Prosum' - Focused on the Design Comparison between Original Burberry and Burberry Prosum - ('버버리 프로섬'의 사례를 통해 본 전통 브랜드의 현대화 연구 - 오리지널 버버리와 버버리 프로섬의 디자인 비교를 중심으로 -)

  • Jung, Kyung-Hee;Kim, Eun-Sil;Bae, Soo-Jeong
    • Journal of Fashion Business
    • /
    • v.13 no.2
    • /
    • pp.87-99
    • /
    • 2009
  • The purpose of this study is to analyse the successful modernization strategy, and the difference between original Burberry and Burberry Prosum design. This will help in providing the fundamental information to Korean luxury fashion brands. Burberry, in particular, is rated as the most popular luxury brand in Korean fashion market. This brand has also rated 5th in sale worldwide and 1st in Korea in 2002, and was continuously been rated in 10th for the last 5 years. Related articles, fashion magazines, fashion web-site were used in this analysis, and the method was theoretical and case study. The results are divided into two categories of internal and external factors and two design patterns of check pattern and trench coat were observed. First of all, internal factor in Burberry is that they have scouted a new CEO and quickly changed their image with famous British models for the purpose of marketing strategies. They have also moved their main shop in London to Bond street, and opened shops in every country's capital cities. They were successful in achieving this by using celebrity marketing strategies with many famous celebrities. Secondly, external factor was that they have hired a designer named Christoper Bailey and this highlighted and enhanced the check pattern and trench coat. As a results, more generalized and diverse design items were presented and accessory line was enhanced, creating a much more younger image. This in turn attracted more younger customers. To sum up, original Burberry focused on classic designs, however Burberry Prosum focused on transforming traditional Burberry design into avant-garde and young. In other words, the reason for the success of this brand is highly dependent on its marketing strategies in which its uniqueness of schizophrenic cloche has appropriately represented and used in design.