• Title/Summary/Keyword: 패스 설계

Search Result 320, Processing Time 0.03 seconds

Symmetry structured RC6 block cipher algorithm (대칭구조RC6블록 암호 알고리즘)

  • Kim, Gil-Ho;Park, Chang-Soo;Kim, Jong-Nam;Cho, Gyeong-Yeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.4
    • /
    • pp.675-683
    • /
    • 2009
  • RC6 which has different algorithm of encryption and decryption has been proposed to have the same algorithm between encryption and decryption through inserting symmetry layer using simple rotate and logical operation. That means the half of whole RC6 round uses encryption algorithm and the rest of it uses decryption one and symmetry layer has been put into the middle of encryption and decryption. The proposed RC6 algorithm has no difference with the original one in the speed of process. However it is quite safe because by inserting symmetry layer the path of high probability which is needed for differential and linear analysis is cut off so that it is hard to be analyzed. The proposed symmetry layer algorithm can be easily applied to the algorithm which has different encryption and decryption and make it same, and it can be good idea to be used to design a new block cipher algorithm.

Effects of Al Contents on Toughness of High Strength GMA Weld Metal (고강도 GMA 용착금속의 충격인성에 미치는 Al의 영향)

  • Park, Hyoung-Keun;Kim, Hee-Jin;Seo, Jun-Seok;Ryoo, Hoi-Soo;Ko, Jin-Hyun
    • Proceedings of the KWS Conference
    • /
    • 2010.05a
    • /
    • pp.30-30
    • /
    • 2010
  • 고강도강의 용접성은 저온균열 저항성으로 대변되는데, TMCP강과 HSLA강 등이 개발되면서 고강도강의 저온균열저항성이 크게 향상되어 무예열 용접성이 확보되었다. 그러나 용접재료 측면에서는 그에 상응하는 재료의 개발이 지연되어 강재 개발로 인한 우수한 성능을 충분히 발휘하지 못하고 있으며 용접부의 건전성 문제가 심각하게 인식되고 있다. 이로 인해 고강도강에 적용시킬 수 있는 무예열 용접재료의 필요성이 대두되어 개발이 진행되고 있으며 상용화를 앞두고 있다. 이러한 용접재료의 개발단계에서 합금설계는 가장 중요한 항목으로 합금 조성에 따라 용착금속의 강도 및 인성에 상당한 변화를 가져오기 때문이다. 합금원소 중 Al은 강재의 탈산을 돕기 때문에 가능한 많은 양의 첨가를 요구하지만 적정량 이상을 초과하게 되면 오히려 용착금속의 저온인성 특성에 부정적인 영향을 미치게 된다. 본 연구에서는 고강도 GMA 용착금속의 Al함량을 단계적으로 변화시켜 용착금속 내 최적의 Al의 함량을 찾고자 하였다. 또한 높은 비용 및 많은 시간을 필요로 하는 와이어로드를 제작하지 않고도 Al함량을 조절 할 수 있는 방법을 고안하고자 하였다. 실험의 모재는 HSLA-100강을 사용하였으며 용접재료는 ER120S-G급의 GMA용접 재료를 사용하였다. 모재 성분과의 희석을 방지하기 위해 V-Groove 가공 후 6패스 Buttering 용접을 실시하였고, 다시 Buttering용접부에 V-Groove 가공을 하여 최종 용접을 실시하였다. 이 때 Al함량을 조절하기 위해 최종 용접 개선부 밑면에 홈을 판 후 Al fiber(직경 0.3mm)를 깔고 용접(입열량 20kJ/cm)하여 Al함유량을 총 3가지(0.003~0.04% Al)로 제어하였다. 용접 후 각각의 시편에 대해 미세조직, 충격시험, O/N분석, 성분분석 등의 시험을 수행하여 저온인성과의 상관관계를 알아보았다.

  • PDF

A Telemetry System using Intra-body Communication for Neural Prosthesis (체내 통신을 이용한 신경 보철용 원격 통신 시스템)

  • Lee, Tae-Hyung;Song, Jong-Keun;Lee, Choong-Jae;Kim, Sung-June
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.44 no.2 s.314
    • /
    • pp.18-23
    • /
    • 2007
  • Intra-body communication' is a wireless communication technology that uses a body as a transmission medium for electrical signals. Generally, an 'earth ground' is used to create an electric field for operating the system; however this operating method could not apply to telemetry for implanted neural prosthetic devices. So this paper suggests a newly designed intra-body communication for neural prosthetic devices. A floating system which has a couple of electrodes with body was studied to remove an influence of the 'earth ground'. We found that 10MHz is the most suitable carrier frequency in skin experiments and over 3MHz in subcutaneous experiments. The system has been applied to a current stimulator circuit for cochlear implant that uses pulse width modulation (PWM) method at 480kbps rate successfully.

Design of Low-Complexity 128-Bit AES-CCM* IP for IEEE 802.15.4-Compatible WPAN Devices (IEEE 802.15.4 호환 WPAN 기기를 위한 낮은 복잡도를 갖는128-bit AES-CCM* IP 설계)

  • Choi, Injun;Lee, Jong-Yeol;Kim, Ji-Hoon
    • Journal of IKEEE
    • /
    • v.19 no.1
    • /
    • pp.45-51
    • /
    • 2015
  • Recently, as WPAN (Wireless Personal Area Network) becomes the necessary feature in IoT (Internet of Things) devices, the importance of data security also hugely increases. In this paper, we present the low-complexity 128-bit AES-$CCM^*$ hardware IP for IEEE 802.15.4 standard. For low-cost and low-power implementation which is essentially required in IoT devices, we propose two optimization methods. First, the folded AES(Advanced Encryption Standard) processing core with 8-bit datapath is presented where composite field arithmetic is adopted for reduced hardware complexity. In addition, to support $CCM^*$ mode defined in IEEE 802.15.4, we propose the mode-toggling architecture which requires less hardware resources and processing time. With the proposed methods, the gate count of the proposed AES-$CCM^*$ IP can be lowered up to 57% compared to the conventional architecture.

A Public-key Cryptography Processor supporting P-224 ECC and 2048-bit RSA (P-224 ECC와 2048-비트 RSA를 지원하는 공개키 암호 프로세서)

  • Sung, Byung-Yoon;Lee, Sang-Hyun;Shin, Kyung-Wook
    • Journal of IKEEE
    • /
    • v.22 no.3
    • /
    • pp.522-531
    • /
    • 2018
  • A public-key cryptography processor EC-RSA was designed, which integrates a 224-bit prime field elliptic curve cryptography (ECC) defined in the FIPS 186-2 as well as RSA with 2048-bit key length into a single hardware structure. A finite field arithmetic core used in both scalar multiplication for ECC and exponentiation for RSA was designed with 32-bit data-path. A lightweight implementation was achieved by an efficient hardware sharing of the finite field arithmetic core and internal memory for ECC and RSA operations. The EC-RSA processor was verified by FPGA implementation. It occupied 11,779 gate equivalents (GEs) and 14 kbit RAM synthesized with a 180-nm CMOS cell library and the estimated maximum clock frequency was 133 MHz. It takes 867,746 clock cycles for ECC scalar multiplication resulting in the estimated throughput of 34.3 kbps, and takes 26,149,013 clock cycles for RSA decryption resulting in the estimated throughput of 10.4 kbps.

Encryption/Decryption the same improved RC6 algorithm (암호/복호를 동일하게 개선한 RC6 알고리즘)

  • Kim, Gil-Ho;Kim, Jong-Nam;Cho, Gyeong-Yeon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.247-250
    • /
    • 2008
  • RC6 which has different algorithm of encryption and decryption has been implemented to have the same algorithm between encryption' and decryption though inserting symmetry layer using simple rotate and logical operation. That means the half of whole RC6 round uses encryption algorithm and the rest of it uses decryption one and symmetry layer has been put into the middle of encryption and decryption. The proposed RC6 algorithm has no difference with the original one in the speed of process. However it is quite safe because by inserting symmetry layer the path of high probability which is needed for differential and linear analysis is cut oft so that it is hard to be analyzed. The proposed algorithm can be easily applied to the algorithm which has different encryption and decryption an make it same, and it can be good idea to be used to design a new block cipher algorithm.

  • PDF

Design of an Analog Array Using Floating Gate MOSFETs (부유게이트를 이용한 아날로그 어레이 설계)

  • 채용웅;박재희
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.35C no.10
    • /
    • pp.30-37
    • /
    • 1998
  • An analog array with a 1.2 $\mu\textrm{m}$ double poly floating gate transistor has been developed with a standard CMOS fabrication process. The programming of each cell by means of an efficient control circuit eliminates the unnecessary erasing operation which has been widely used in conventional analog memories. It is seen that the path of the signal for both the programming and the reading is almost exactly the same since just one comparator supports both operations. It helps to eliminate the effects of the amplifier input-offset voltage problem on the output voltage for the read operation. In the array, there is no pass transistor isolating a cell of interest from the adjacent cells in the array. Instead of the extra transistors, one extra bias voltage, Vmid, is employed. The experimental results from the memory shows that the resolution of the memory is equivalent to the information content of at least six digital cells. Programming/erasing of each cell is achieved with no detectable disturbance of adjacent cells. Finally, the unique shape of the injector structure in a EEPROM is adopted as a cell of analog array. It reduces the programming voltage below the transistor breakdown voltage without any special fabrication process.

  • PDF

Video Conferencing Authentication : A Key Management Protocol Design for safety (화상상담 인증 : 안전한 키 관리 프로토콜 설계)

  • Deug, Jung-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.12
    • /
    • pp.85-92
    • /
    • 2010
  • There is an authentication method for participants with an encrypted ID and password as a symmetric-key in multilateral video conferencing. It is hard to manage when the security-keys makes many while the transportation processing for the encryption and decryption get complicated when the video conferencing involves a number of participants and the third party as an attackers to gain unauthorized symmetric-key to access video conference which makes a problem less secrecy. This study suggests three ways to enhance security in video conference: first, we present PKI-based X.509 certificate for authenticating the participants of multilateral conferencing and we suggest to encode and decode the video conference media data using a secrecy key created by each of the conference participants; second, a more secured multilateral video conferencing can be expected in a group communication by using the participants secrecy key in creating and distributing group keys, where the group key will be renewed whenever there is change in the group member; and finally, we suggest to encode the RTP payload of the media data before transmission.

Implementation of Algebra and Data Model based on a Directed Graph for XML (방향 그래프 기반 XML 데이터 모델과 대수 구현)

  • Park, Seong-Hui;Choe, Eun-Seon;Ryu, Geun-Ho
    • The KIPS Transactions:PartD
    • /
    • v.8D no.6
    • /
    • pp.799-812
    • /
    • 2001
  • As XML become more popular for encoding data and exchanging format on the web, recent work on processing XML Document in DBMS has been performed. However, there is no formal data model for XML, and there is lack of research on XML algebra for processing complex XML query and even the mediators have many restrictions. Therefore, this paper proposes formal data model and algebra based on directed edge labeled graph for XML query. To implement algebra, not only algorithms of operation for algebra are presented, but also they are implemented using access method and path index based on RDBMS or ORDBMS. In particular, experiments to show the effectiveness of the implemented algebra are performed on XML documents on EST data which are semistructured data.

  • PDF

Design Errors and Cryptanalysis of Shin's Robust Authentication Scheme based Dynamic ID for TMIS

  • Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.10
    • /
    • pp.101-108
    • /
    • 2021
  • In this paper, we analyze Shin's proposed dynamic ID-based user authentication scheme for TMIS(Telecare Medicine Information System), and Shin's authentication scheme is vulnerable to smart card loss attacks, allowing attackers to acquire user IDs, which enables user impersonation attack. In 2019, Shin's proposed authentication scheme attempted to generate a strong random number using ECC, claiming that it is safe to lose a smart card because it is impossible to calculate random number r'i due to the difficulty of the ECC algorithm without knowing random number ri. However, after analyzing Shin's authentication scheme in this paper, the use of transmission messages and smart cards makes it easy to calculate random numbers r'i, which also enables attackers to generate session keys. In addition, Shin's authentication scheme were analyzed to have significantly greater overhead than other authentication scheme, including vulnerabilities to safety analysis, the lack of a way to pass the server's ID to users, and the lack of biometric characteristics with slightly different templates.