• Title/Summary/Keyword: Checking procedure

Search Result 129, Processing Time 0.045 seconds

Secure RSA with CRT Protected Against Fault Attacks without using Checking Procedure (비교연산을 사용하지 않는 오류주입 공격에 안전한 CRT 기반의 RSA)

  • Kim, Sung-Kyoung;Kim, Tae-Hyun;Han, Dong-Guk;Park, Young-Ho;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.17-25
    • /
    • 2008
  • Because Chinese Remainder Theorem based RSA (RSA CRT) offers a faster version of modular exponentiation than ordinary repeated squaring, it is promoting with standard. Unfortunately there are major security issues associated with RSA CRT, since Bellcore announced a fault-based cryptanalysis against RSA CRT in 1996. In 1997, Shamir developed a countermeasure using error free immune checking procedure. And soon it became known that the this checking procedure can not effect as the countermeasures. Recently Yen proposed two hardware fault immune protocols for RSA CRT, and this two protocols do not assume the existence of checking procedure. However, in FDTC 2006, the method of attack against the Yen's two protocols was introduced. In this paper, the main purpose is to present a countermeasure against the method of attack from FDTC 2006 for CRT-RSA. The proposed countermeasure use a characteristic bit operation and dose not consider an additional operation.

A Test Procedure for Checking the Proportionality Between Hazard Functions

  • Lee, Seong-Won;Kim, Ju-Seong
    • Journal of the Korean Data and Information Science Society
    • /
    • v.14 no.3
    • /
    • pp.561-570
    • /
    • 2003
  • We propose a nonparametric test procedure for checking the proportionality assumption between hazard functions using a functional equation. Because of the involvement of censoring distribution function, we consider the large sample case only and obtain the asymptotic normality of the proposeed test statistic. Then we discuss the rationale of the use of the functional equation, give some examples and compare the performances with Andersen's procedure by computing powers through simulations.

  • PDF

A Case Study on Developing a Checking System of Gear Parts (기어 부품의 검사시스템 개발에 관한 사례)

  • Yun, Tae-Hong;Byun, Jai-Hyun
    • IE interfaces
    • /
    • v.21 no.4
    • /
    • pp.378-384
    • /
    • 2008
  • Small sized companies have not been successful in systematically applying statistical process control because of insufficient human resources. In this paper we present a case study of automatic checking system for a small sized company which produces various types of gears. A systematic way of automatically measuring gears is proposed and statistical analysis methods are presented. To reduce variation in the measurement data, a standard operating procedure is also proposed. This case study can be helpful to quality assurance practitioners of small sized companies who are willing to develop checking or inspection systems for their products.

Formal Modeling and Verification of an Enhanced Variant of the IEEE 802.11 CSMA/CA Protocol

  • Hammal, Youcef;Ben-Othman, Jalel;Mokdad, Lynda;Abdelli, Abdelkrim
    • Journal of Communications and Networks
    • /
    • v.16 no.4
    • /
    • pp.385-396
    • /
    • 2014
  • In this paper, we present a formal method for modeling and checking an enhanced version of the carrier sense multiple access with collision avoidance protocol related to the IEEE 802.11 MAC layer, which has been proposed as the standard protocol for wireless local area networks. We deal mainly with the distributed coordination function (DCF) procedure of this protocol throughout a sequence of transformation steps. First, we use the unified modeling language state machines to thoroughly capture the behavior of wireless stations implementing a DCF, and then translate them into the input language of the UPPAAL model checking tool, which is a network of communicating timed automata. Finally, we proceed by checking of some of the safety and liveness properties, such as deadlock-freedom, using this tool.

The Security Analysis of Previous CRT-RSA Scheme on Modified Opcode and Operand Attack (연산자 조작 공격과 피연산자 조작 공격에 대한 기존 CRT-RSA Scheme의 안전성 분석)

  • Hur, Soon-Haeng;Lee, Hyung-Sub;Rhee, Hyun-Seung;Choi, Dong-Hyun;Won, Dong-Ho;Kim, Seung-Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.185-190
    • /
    • 2009
  • As the use of RSA based on chinese remainder theorem(CRT-RSA) is being generalized, the security of CRT-RSA has been important. Since Bellcore researchers introduced the fault attacks on CRT-RSA, various countermeasures have been proposed. In 1999, Shamir firstly proposed a countermeasure using checking procedure. After Shamir's countermeasure was introduced, various countermeasures based on checking procedure have been proposed. However, Shamir's countermeasure was known to be vulnerable to the modified operand attack by Joey et al. in 2001, and the checking procedure was known to be vulnerable to the modified opcode attack by Yen et al. in 2003. Yen et al. proposed a new countermeasure without checking procedure, but their countermeasure was known to be also vulnerable to the modified operand attack by Yen and Kim in 2007. In this paper, we point out that pre, but countermeasures were vulnerable to the modified operand attack or the modified opcode attack.

A Study on Diagnosis Support using Knowledge of Diseases from Literature (문헌 내 병명 정보를 활용한 진단 지원 방안 연구)

  • Oh, Yong-Taek;Kim, An-Na;Kim, Sang-Kyun;Jang, Hyun-Chul
    • Journal of Haehwa Medicine
    • /
    • v.23 no.1
    • /
    • pp.13-20
    • /
    • 2014
  • Objectives : Clinical data in traditional medicine, such as Korean medicine, traditional Chinese medicine have a long history of accumulating evidence and these rich data are recorded in classic literature. We have conducted a study of developing an algorithm that support clinical diagnosis with composing both users knowledge and data obtained from literature. In order to define necessary information and required steps in diagnosis procedure, we have established a clinical diagnostic procedure including a step of collecting patients symptoms, a step of determining candidates, a step of diagnostic decisions, a step of deciding of treatment and a step of adjusting medicinal treatment. Methods : Our study have been based on the following premises. 1. Using data obtained from literature contributes to accurate diagnosis 2. Displaying the data before users request contributes to accurate conclusion. Displaying before users request enable users to recognize their overlooking a fact on purpose or not. 3. Checking symptoms that are commonly accompanied with a group of diseases that accompany symptoms appealed by a patient contributes to accurate conclusion. These symptoms are worthy of checking. 4. Comparing more than two candidates contributes to accurate conclusion. Users can compare their accompanied symptoms with patients symptoms and this helps users to make a decision. Results : Based on the above premises, we have developed an literature based algorithm to provide various functions, such as recommending symptoms to check, comparing groups of symptoms, differential diagnosis, recommending medicinal materials to prescribe, and more. Conclusions : By the results of simulation with virtual diagnostic scenario, we concluded this algorithm is useful helping clinician in diagnosis procedure.

Bayesian Procedure for the Multiple Test of Fraction Nonconforming (부적합률의 다중검정을 위한 베이지안절차)

  • Kim, Kyung-Sook;Kim, Hee-Jeong;Na, Myung-Hwan;Son, Young-Sook
    • Journal of Korean Society for Quality Management
    • /
    • v.34 no.1
    • /
    • pp.73-77
    • /
    • 2006
  • In this paper, the Bayesian procedure for the multiple test of fraction nonconforming, p, is proposed. It is the procedure for checking whether the process is out of control, in control, or under the permissible level for p. The procedure is as follows: first, setting up three types of models, $M_1:p=p_0,\;M_2:pp_0$, second, computing the posterior probability of each model. and then choosing the model with the largest posterior probability as a model most fitted for the observed sample among three competitive models. Finally, the simulation study is performed to examine the proposed method.

Bayesian Procedure for the Multiple Test of Fraction Nonconforming (부적합률의 다중검정을 위한 베이지안절차)

  • Kim, Kyung-Sook;Kim, Hee-Jeong;Na, Myung-Hwan;Son, Young-Sook
    • Proceedings of the Korean Society for Quality Management Conference
    • /
    • 2006.04a
    • /
    • pp.325-329
    • /
    • 2006
  • In this paper, the Bayesian procedure for the multiple test of fraction nonconforming, p, is proposed. It is the procedure for checking whether the process is out of control, in control, or under the permissible level for p. The procedure is as follows: first, setting up three types of models, $M_1:p=p_0,\;M_2:pp_0$, second, computing the posterior probability of each model. and then choosing the model with the largest posterior probability as a model most fitted for the observed sample among three competitive models. Finally, the simulation study is performed to examine the proposed method.

  • PDF

Chosen Message Attack on the RSA-CRT Countermeasure Based on Fault Propagation Method (오류 확산 기법에 기반한 RSA-CRT 대응책에 대한선택 메시지 공격)

  • Baek, Yi-Roo;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.3
    • /
    • pp.135-140
    • /
    • 2010
  • The computation using Chinese Remainder Theorem in RSA cryptosystem is well suited in the digital signature or decryption processing due to its low computational load compared to the case of general RSA without CRT. Since the RSA-CRT algorithm is vulnerable to many fault insertion attacks, some countermeasures against them were proposed. Among several countermeasures, Yen et al. proposed two schemes based on fault propagation method. Unfortunately, a new vulnerability was founded in FDTC 2006 conference. To improve the original schemes, Kim et al. recently proposed a new countermeasure in which they adopt the AND operation for fault propagation. In this paper, we show that the proposed scheme using AND operation without checking procedure is also vulnerable to fault insertion attack with chosen messages.

Local Model Checking for Verification of Real-Time Systems (실시간 시스템 검증을 위한 지역모형 검사)

  • 박재호;김성길;황선호;김성운
    • Journal of Korea Multimedia Society
    • /
    • v.3 no.1
    • /
    • pp.77-90
    • /
    • 2000
  • Real-Time verification is a procedure that verifies the correctness of specification related to requirement in time as well as in logic. One serious problem encountered in the verification task is that the state space grows exponentially owing to the unboundedness of time, which is termed the state space explosion problem. In this paper, we propose a real-time verification technique checking the correctness of specification by showing that a system model described in timed automata is equivalent to the characteristic of system property specified in timed modal-mu calculus. For this, we propose a local model checking method based on the value of the formula in initial state with constructing product graph concerned to only the nodes needed for verification process. Since this method does not search for every state of system model, the state space is reduced drastically so that the proposed method can be applied effectively to real-time system verification.

  • PDF