• Title/Summary/Keyword: CIST

Search Result 194, Processing Time 0.029 seconds

An Efficient Architecture for Modified Karatsuba-Ofman Algorithm (불필요한 연산이 없는 카라슈바 알고리즘과 하드웨어 구조)

  • Chang Nam-Su;Kim Chang-Han
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.43 no.3 s.345
    • /
    • pp.33-39
    • /
    • 2006
  • In this paper we propose the Modified Karatsuba-Ofman algorithm for polynomial multiplication to polynomials of arbitrary degree. Leone proposed optimal stop condition for iteration of Karatsuba-Ofman algorithm(KO). In this paper, we propose a Non-Redundant Karatsuba-Ofman algorithm (NRKOA) with removing redundancy operations, and design a parallel hardware architecture based on the proposed algorithm. Comparing with existing related Karatsuba architectures with the same time complexity, the proposed architecture reduces the area complexity. Furthermore, the space complexity of the proposed multiplier is reduced by 43% in the best case.

Differential Fault Analysis on Lightweight Block Cipher LBlock (경량 블록 암호 LBlock에 대한 차분 오류 공격)

  • Jeong, Ki-Tae;Lee, Chang-Hoon
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.5
    • /
    • pp.871-878
    • /
    • 2012
  • LBlock is a 64-bit ultra-light block cipher suitable for the constrained environments such as wireless sensor network environments. In this paper, we propose a differential fault analysis on LBlock. Based on a random nibble fault model, our attack can recover the secret key of LBlock by using the exhaustive search of $2^{25}$ and five random nibble fault injection on average. It can be simulated on a general PC within a few seconds. This result is superior to known differential fault analytic result on LBlock.

A Study on Function of Total Security Management based on Enterprise Business Continuity (기업의 사업 연속성을 고려한 통합 보안관리 기능에 관한 연구)

  • Nam, Sang-Whun;Lim, Jong-In
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1209-1212
    • /
    • 2005
  • 본 연구는 기업의 사업연속성 확보를 위한 관점에서 정보보호 영역의 통합보안관리 기능을 확장, 제시한다. 기업은 윤리경영을 기초로 사업과 서비스를 통한 수익창출을 목적으로 하며, 기업이 사업의 중단을 가져올 여러 요인을 사전 파악하여 예방, 대응하는 것은 기업의 생존에 직결된다. 기업의 사업연속성에 관련된 요인은 다양하고 복합적으로 관련되어 있어 조기 파악하고 관리하는 것은 어려운 일이다. 그러므로 사업연속성에 영향을 미치는 위험 요소에 대한 기능들이 개별적으로 운영되기 보다, 종합적으로 연계되고 일관적으로 관리되어지는 것이 필요하다. 대부문의 기업이 자사의 사업 및 서비스를 정보화에 의한 정보통신 및 정보처리 환경에서 운영하고 있어, 주요 경영정보 및 고객정보의 유출 및 해킹으로 인한 보안사고는 기업의 사업연속성에 점점 심각한 영향을 미치고 있다. 종합적인 보안관리를 위한 통합보안관리의 기능은 매우 중요하나, 현재 정보보호의 범위안에서 보안관제를 주 기능으로 활용하고 있으며, 구축된 보안관리 기능도 제한적으로 활용되고 있는 상황이다. 그러므로, 사업연속성 확보를 위한 기업의 통합보안관리 기능과 환경에 대한 개선 및 재검토가 요구된다. 이를 위해 사업연속성 확보를 고려한 통합보안관리의 기능항목과 구성을 정의하고 통합보안관리의 추진 방향과 기 구축된 통합보안관리 환경의 개선사항을 제시하여 통합보안관리가 기업의 사업연속성 확보에 실질적인 역할을 하게 함에 있다.

  • PDF

A Study on the Selection of Six Sigma Project theme in Enterprise Information Security Domain (기업의 정보보호 영역에서 Six Sigma 추진 과제선정에 관한 연구)

  • Nam, Sang-Whun;Lim, Jong-In
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.1019-1022
    • /
    • 2005
  • 본 연구는 기업이 경영혁신 방침으로 Six Sigma 추진시 정보보호영역에서의 과제선정에 대한 기준을 제시한다. 기업은 윤리경영을 기초로 사업과 서비스를 통한 수익창출을 목적으로 한다. 기업은 안정적인 사업, 서비스의 정보환경을 확보,유지하기 위해 지속적인 보안활동을 통하여 Risk 를 줄이는 작업을 해오고 있다. 기업의 정보보호 활동과 패턴은 초기의 정보보호 기본기능을 도입, 구축하는 단계에서 탈피하여, 점진적으로 종합적인 관리체계로 수렴되고 있으며 산출되는 관련 정보와 Data 의 정규화를 기초로 정량적으로 관리가 이루어 지는 시점에 와 있다. 그러나, 정보보호 침해사고 예방 및 대응활동, 예측 불허한 상황에서 발생되는 보안사고, 책임문제의 발생, 정성적으로 관리되는 상황 등은 정보보호 영역의 Six Sigma 추진시 과제선정의 어려움으로 작용한다. 정보보호 영역에서 Six Sigma 과제 선정은 일반적인 Six Sigma 과제 선정과는 다르게 정보보호 특성을 고려하여 선정하여 추진하는 것이 바람직하다. 정보보호 활동에 대한 기업의 투자효과도 비재무적 성과외에 경제적 가치요소를 기초로 재무적 성과를 산출하고, 관리하여야 한다. 국내 기업들이 Six Sigma 를 경영혁신 기법으로 확대 적용하고 있는 상황에서 정보보호 영역의 Six Sigma 과제선정에 대한 제안을 통하여 정량적 목표수준 관리에 의한 성공적인 Six Sigma 성과를 달성할 수 있도록 함에 있다.

  • PDF

Efficient Method of Detecting Blurry Images

  • Tsomko, Elena;Kim, Hyoung-Joong;Paik, Joon-Ki;Yeo, In-Kwon
    • Journal of Ubiquitous Convergence Technology
    • /
    • v.2 no.1
    • /
    • pp.27-39
    • /
    • 2008
  • In this paper we present a simple, efficient method for detecting the blurry photographs. Recently many digital cameras are equipped with various auto-focusing functions to help users take well-focused pictures as easily as possible. In addition, motion compensation devices are able to compensate motion causing blurriness in the images. However, digital pictures can be degraded by limited contrast, inappropriate exposure, imperfection of auto-focusing or motion compensating devices, unskillfulness of the photographers, and so on. In order to decide whether to process the images or not, or whether to delete them or not, reliable measure of image degradation to detect blurry images from sharp ones is needed. This paper presents a blurriness/sharpness measure, and demonstrates its feasibility by using extensive experiments. This method is fast, easy to implement and accurate. Regardless of the detection accuracy, the proposed measure in this paper is not demanding in computation time. Needless to say, this measure can be used for various imaging applications including auto-focusing and astigmatism correction.

  • PDF

[Retracted]"Our Village's Pretty Dementia Shelter Program" for Rural Residents: A Case Report ([논문철회]농촌 지역 주민맞춤 '우리마을 예쁜치매쉼터 프로그램' 사례)

  • Chun, Yeol Eo
    • Journal of Korean Academy of Rural Health Nursing
    • /
    • v.18 no.2
    • /
    • pp.73-79
    • /
    • 2023
  • Purpose: This study describes how public health officials running clinic-centered around "Our Village's Pretty Dementia Shelter" improved their ability to cope with dementia and health by implementing early dementia screening and cognitive intervention programs. Methods: This study targeted 11 hopeful seniors from 6 villages, who were residents of the area under the jurisdiction of Health Clinic B located in County A, were over 65 years of age, and had not experienced Our Village's Pretty dementia shelters. Results: The results of the Cognitive Screening Test (CIST) showed that scores improved on all evaluation items and depression decreased. Through the dementia prevention program, health improved, vitality increased through leisure activities and cultural experiences in daily life, and the quality of life improved. Aadditionally, participating with close neighbors has become an activity that can make dementia prevention activities a habit and widespread practice. Conclusion: This case demonstrate the need for continued implementation of dementia prevention and health promotion programs for rural residents. Accordingly, it is necessary to continuously operate dementia prevention programs by diversifying them and securing expertise from rural nurses.

Efficient Polynomial Multiplication in Extension Field GF($p^n$) (확장체 GF($p^n$)에서 효율적인 다항식 곱셈 방법)

  • Chang Namsu;Kim Chang Han
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.42 no.5 s.335
    • /
    • pp.23-30
    • /
    • 2005
  • In the construction of an extension field, there is a connection between the polynomial multiplication method and the degree of polynomial. The existing methods, KO and MSK methods, efficiently reduce the complexity of coefficient-multiplication. However, when we construct the multiplication of an extension field using KO and MSK methods, the polynomials are padded with necessary number of zero coefficients in general. In this paper, we propose basic properties of KO and MSK methods and algorithm that can reduce coefficient-multiplications. The proposed algorithm is more reducible than the original KO and MSK methods. This characteristic makes the employment of this multiplier particularly suitable for applications characterized by specific space constrains, such as those based on smart cards, token hardware, mobile phone or other devices.

Security Architecture Proposal for Threat Response of insider in SOA-based ESB Environment (SOA 기반 ESB 환경에서 내부 종단 사용자 위협 대응을 위한 보안 아키텍처 제안)

  • Oh, Shi-hwa;Kim, In-seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.55-63
    • /
    • 2016
  • SOA(service oriented architecture) based ESB(enterprise service bus) model is widely adopted in many companies for the safe processing of enormous data and the integration of business system. The existing web service technologies for the construction of SOA, however, show unsatisfactory in practical applications though the standardization of web service security technologies is in progress due to their limitations in safe exchange of data. Internal end users using a large business system based on such environment are composed of the variety of organizations and roles. Companies might receive more serious damage from insider threat than that from external one when internal end users get unauthorized information beyond the limits of their authority for private profit and bad purposes. In this paper, we propose a security architecture capable of identifying and coping with the security threats of web service technologies arouse from internal end users.

A Serial Multiplier for Type k Gaussian Normal Basis (타입 k 가우시안 정규기저를 갖는 유한체의 직렬곱셈 연산기)

  • Kim, Chang-Han;Chang, Nam-Su
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.43 no.2 s.344
    • /
    • pp.84-95
    • /
    • 2006
  • In H/W implementation for the finite field the use of normal basis has several advantages, especially, the optimal normal basis is the most efficient to H/W implementation in $GF(2^m)$. In this paper, we propose a new, simpler, parallel multiplier over $GF(2^m)$ having a Gaussian normal basis of type k, which performs multiplication over $GF(2^m)$ in the extension field $GF(2^{mk})$ containing a type-I optimal normal basis. For k=2,4,6 the time and area complexity of the proposed multiplier is the same as tha of the best known Reyhani-Masoleh and Hasan multiplier.

The Model for the Evolution of Retail Institution Types (점포진화모델)

  • Kim, Sook-Hyun;Kincade Doyis H.
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.30 no.12 s.159
    • /
    • pp.1661-1671
    • /
    • 2006
  • Many researchers have studied the process of retail evolution in the United States and in Europe. Although extensively studied(e.g., Agergaard, Olsen & Allpass, 1970; Oren, 1989), used in conceptual work(e.g., Cist, 1968), and applied as foundation in empirical work(e.g., HcNair, 1958), some limitations exist as follows: inability to cover multiple types of retail institutions and limited quantification. The purpose of this study is to build a conceptual framework combining existing retail evolution theories to overcome existing limitations. Data collection and analysis followed a qualitative research design, specifically a grounded theory type of design with a constant comparative analysis method. As a result of the study, a conceptual framework was built by synthesizing aspects of retail evolution theories and showed retail institution types in a change process.