• Title/Summary/Keyword: 키배열

Search Result 50, Processing Time 0.023 seconds

A Design of Electronic Payment Protocol and Using Image authentication scheme on PDA (PDA 에서 이미지를 이용한 인증방안 및 전자지불 프로토콜 설계)

  • Choi, Yong-Sik;John, Young-Jun;Shin, Seung-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11c
    • /
    • pp.1767-1770
    • /
    • 2003
  • PDA 는 터치패드 방식의 문자 입력을 한다. 따라서 사용자에게 긴 입력을 요구할 때 불편한 환경을 제공한다. 따라서 이미지의 특정 지점을 마우스로 선택함으로 문자입력을 대신하여 인증을 함으로써 편리한 환경을 제공한다. 보안을 제공하기 위하여 초기 이미지에 따른 이미지의 배열 정보 및 입력된 값을 해시코드화 하여 인증 및 키교환이 안전하게 이루어진다. HASH와 SEED 암호화 알고리즘을 적용하여 효율적이고, 전송 메시지의 무결성을 보장하며 내부 참여자에 의한 정보 유출이 있더라도 안전한 전자지불 프로토콜 시스템을 설계 및 구현하였다.

  • PDF

A Study on the Optimum Size Calculation of Unit Classroom in Elementary School Based on the Size of the Human Body and the Layout of Teaching Tools and Desks (인체치수와 교구배치를 고려한 초등학교 일반교실의 규모산정계획에 관한 연구)

  • Kim Hak-Rae
    • Archives of design research
    • /
    • v.19 no.4 s.66
    • /
    • pp.17-30
    • /
    • 2006
  • This study is for the size calculation of classroom based on the size of human body and teaching tools. The curriculum of Elementary school has been changed since 1960. It has been reflected on the size of classroom of elementary school. The new education curriculum-the 7th curriculum- demands various activities in classroom. And the Ministry of Education repealed the statute about the facilities of the schools on September in 1997. So we need to different size of unit space of the classroom in elementary school because the size of classroom will affect the quality of education. It is generally known that a part of human body-size has an invariable proportion with human's status, age and weight. In this study, regression analysis is used to find out a part of human body-size of Korean. Then the size of classroom is calculated by the part of human body-size, teaching tools and the type of desk arrangement.

  • PDF

User Adaptive Variable Keyboard for Smart Devices (스마트 기기 사용자 적응형 가변 키보드)

  • Jeoung, You-Sun;Choi, Dong-Min
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.6
    • /
    • pp.1167-1172
    • /
    • 2017
  • Desktop computers, which were the main means of Internet use and information activity, were pushed out by smart devices that emphasized mobility and simplicity. The recent information production and consumption activities are performed through smart devices, but there is no input device for smart devices that can fully replace traditional input devices such as full-size PC compatible keyboards. Because of the small size of the virtual keyboard that uses the touch screen of the smart device, typographical error occurs at a high rate. In this paper, we propose a variable virtual keyboard that minimizes the typographical errors of the conventional virtual keyboards. The proposed method minimizes the user 's input error by adjusting the size of each key of the virtual keyboard based on accumulated dataset of position and pressure of the user' s input error even though there is no difference in the key position arrangement of the conventional virtual keyboards.

3X Serial GF($2^m$) Multiplier Architecture on Polynomial Basis Finite Field (Polynomial basis 방식의 3배속 직렬 유한체 곱셈기)

  • Moon, Sang-Ook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.2
    • /
    • pp.328-332
    • /
    • 2006
  • Efficient finite field operation in the elliptic curve (EC) public key cryptography algorithm, which attracts much of latest issues in the applications in information security, is very important. Traditional serial finite multipliers root from Mastrovito's serial multiplication architecture. In this paper, we adopt the polynomial basis and propose a new finite field multiplier, inducing numerical expressions which can be applied to exhibit 3 times as much performance as the Mastrovito's. We described the proposed multiplier with HDL to verify and evaluate as a proper hardware IP. HDL-implemented serial GF (Galois field) multiplier showed 3 times as fast speed as the traditional serial multiplier's adding only partial-sum block in the hardware. So far, there have been grossly 3 types of studies on GF($2^m$) multiplier architecture, such as serial multiplication, array multiplication, and hybrid multiplication. In this paper, we propose a novel approach on developing serial multiplier architecture based on Mastrovito's, by modifying the numerical formula of the polynomial-basis serial multiplication. The proposed multiplier architecture was described and implemented in HDL so that the novel architecture was simulated and verified in the level of hardware as well as software.

A Scalable ECC Processor for Elliptic Curve based Public-Key Cryptosystem (타원곡선 기반 공개키 암호 시스템 구현을 위한 Scalable ECC 프로세서)

  • Choi, Jun-Baek;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.8
    • /
    • pp.1095-1102
    • /
    • 2021
  • A scalable ECC architecture with high scalability and flexibility between performance and hardware complexity is proposed. For architectural scalability, a modular arithmetic unit based on a one-dimensional array of processing element (PE) that performs finite field operations on 32-bit words in parallel was implemented, and the number of PEs used can be determined in the range of 1 to 8 for circuit synthesis. A scalable algorithms for word-based Montgomery multiplication and Montgomery inversion were adopted. As a result of implementing scalable ECC processor (sECCP) using 180-nm CMOS technology, it was implemented with 100 kGEs and 8.8 kbits of RAM when NPE=1, and with 203 kGEs and 12.8 kbits of RAM when NPE=8. The performance of sECCP with NPE=1 and NPE=8 was analyzed to be 110 PSMs/sec and 610 PSMs/sec, respectively, on P256R elliptic curve when operating at 100 MHz clock.

(Speaking by using hands') - Wearable PC for the verbally handicapped (('손으로 말해요') - 언어 장애인의 의사소통을 돕기 위한 웨어러블 PC)

  • Kim, Kyung-Hee;Kim, Kee-Hyung;Kim, Ha-Na;Park, Ji-Woo;Sun, Jung-Hee;Lee, Jae-Hyung;Jung, Jong-Phil
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02a
    • /
    • pp.52-56
    • /
    • 2006
  • 선천적인 원인으로 인해 언어 장애를 겪고 있는 사람들이나 후두암 등 후천적 질환이 원인이 되어 의사 소통에 불편을 겪는 사람들이 있다. 본 논문에서 제안하는 '손으로 말해요'는 이러한 사람들의 의사 표현을 돕기 위한 장치이다. 뇌에 손상이 있거나 성대에 손상이 있어 말하는 것이 어려운 장애인들이 장갑모양의 입력장치와 목 부위에 부착된 스피커를 이용해 말할 수 있다. 이 스피커를 통해 흘러나오는 인공의 목소리로 의사 소통할 수 있다. 언어장애인을 위한 본 웨어러블 PC 의 특징은 먼저 블루투스 모듈을 이용한 간단한 손가락 동작만으로도 입력이 가능한 장갑 모양의 입력장치이다. 사용이 불편한 엄지 손가락을 제외한 나머지 네 손가락에 각 하나씩 양손 총 8 개의 스위치가 부착되어 있다. 사용자는 손가락을 굽혀 손바닥에 스위치가 닿도록 하거나 책상 등과 같이 편평한 탁자에 손가락 끝을 닿게 하여 스위치를 누를 수 있다. 장갑의 키 배열은 PC 키보드의 배열과 같아 사용자가 쉽게 적응할 수 있다. 다음으로 본 장치는 자연스러운 목소리가 흘러나오는 음성 합성 모듈을 탑재하였다. 모듈의 출력 음성은 실제 말하는 것과 같은 자연스러운 억양을 지니고 있으며, 스피커는 목소리가 흘러나오는 위치가 자연스럽도록 목 부위에 부착되어 있다. 그리고 HMD(Head Mounted Display)를 탑재하여 자신이 텍스트를 정확하게 입력하고 있는지 이를 통해 확인할 수 있다. 장갑을 제외한 모든 장비는 가방에 탑재하여 착용이 편리하도록 하였고, 장갑은 블루투스 모듈을 이용하여 이용에 불편을 주는 전선을 제거하였다. 본 논문에서 제안하는 '손으로 말해요'는 간단한 손가락 동작을 이용하여 자연스러운 목소리로 말하고자 하는 내용을 전달할 수 있기 때문에 언어장애로 불편함을 겪는 사람들에게 도움을 줄 수 있다.

  • PDF

An Experimental Study on the Effectiveness of Storyboard Surrogates in the Meanings Extraction of Digital Videos (비디오자료의 의미추출을 위한 영상초록의 효용성에 관한 실험적 연구)

  • Kim, Hyun-Hee
    • Journal of the Korean Society for information Management
    • /
    • v.24 no.4
    • /
    • pp.53-72
    • /
    • 2007
  • This study is designed to assess whether storyboard surrogates are useful enough to be utilized for indexing sources as well as for metadata elements using 12 sample videos and 14 participants. Study shows that first, the match rates of index terms and summaries are significantly different according to video types, which means storyboard surrogates are especially useful for the type of videos of conveying their meanings mainly through images. Second, participants could assign subject keywords and summaries to digital video, sacrificing a little loss of full video clips' match rates. Moreover, the match rate of index terms (0.45) is higher than that of summaries (0.40). This means storyboard surrogates could be more useful for indexing videos rather than summarizing them. The study suggests that 1)storyboard surrogates can be used as sources for indexing and abstracting digital videos; 2) using storyboard surrogates along with other metadata elements (e.g., text-based abstracts) can be more useful for users' relevance judgement; and 3)storyboard surrogates can be utilized as match sources of image-based queries. Finally, in order to improve storyboard surrogates quality, this study proposes future studies: constructing key frame extraction algorithms and designing key frame arrangement models.

Power analysis attacks against NTRU and their countermeasures (NTRU 암호에 대한 전력 분석 공격 및 대응 방법)

  • Song, Jeong-Eun;Han, Dong-Guk;Lee, Mun-Kyu;Choi, Doo-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.11-21
    • /
    • 2009
  • The NTRU cryptosystem proposed by Hoffstein et al. in 1990s is a public key cryptosystem based on hard lattice problems. NTRU has many advantages compared to other public key cryptosystems such as RSA and elliptic curve cryptosystems. For example, it guarantees high speed encryption and decryption with the same level of security, and there is no known quantum computing algorithm for speeding up attacks against NTRD. In this paper, we analyze the security of NTRU against the simple power analysis (SPA) attack and the statistical power analysis (STPA) attack such as the correlation power analysis (CPA) attack First, we implement NTRU operations using NesC on a Telos mote, and we show how to apply CPA to recover a private key from collected power traces. We also suggest countermeasures against these attacks. In order to prevent SPA, we propose to use a nonzero value to initialize the array which will store the result of a convolution operation. On the other hand, in order to prevent STPA, we propose two techniques to randomize power traces related to the same input. The first one is random ordering of the computation sequences in a convolution operation and the other is data randomization in convolution operation.

Optical System Implementation of OFB Block Encryption Algorithm (OFB 블록 암호화 알고리즘의 광학적 시스템 구현)

  • Gil, Sang-Keun
    • Journal of IKEEE
    • /
    • v.18 no.3
    • /
    • pp.328-334
    • /
    • 2014
  • This paper proposes an optical encryption and decryption system for OFB(Output Feedback Block) encryption algorithm. The proposed scheme uses a dual-encoding technique in order to implement optical XOR logic operation. Also, the proposed method provides more enhanced security strength than the conventional electronic OFB method due to the huge security key with 2-dimensional array. Finally, computer simulation results of encryption and decryption are shown to verify the proposed method, and hence the proposed method makes it possible to implement more effective and stronger optical block encryption system with high-speed performance and the benefits of parallelism.

A Study on the authentication scheme for Security of Wireless Internet (무선 인터넷에서 보안을 위한 인증방안에 관한 연구)

  • 최용식;강찬희;신승호
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.11
    • /
    • pp.87-91
    • /
    • 2004
  • The continuing development of the information technology industry and wireless networking has increased the use of mobile device, which provides both portability and mobility. As follows, demands for extended services within the wireless Internet are increasing rapidly. Because it still in its initial stages of development, the wireless Internet presents continuing problems in security and limitations in the content of services. Furthermore, most mobile equipment utilizes the touch pad input method. This input method is inconvenient when a user needs to input a long sentence. This has led to the more convenient development of image selection by using a pen mouse. In order to provide security under these conditions, a HASH code may be used to transmit an array of information and input values, created by the image input at the early stages. Thus, authentication and key exchange are completed securely. Messages are encoded and transmitted, preventing both information drain by insiders and interference from outside.