• Title/Summary/Keyword: Composite Security

Search Result 104, Processing Time 0.021 seconds

The Impact of Various Degrees of Composite Minimax ApproximatePolynomials on Convolutional Neural Networks over Fully HomomorphicEncryption (다양한 차수의 합성 미니맥스 근사 다항식이 완전 동형 암호 상에서의 컨볼루션 신경망 네트워크에 미치는 영향)

  • Junghyun Lee;Jong-Seon No
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.861-868
    • /
    • 2023
  • One of the key technologies in providing data analysis in the deep learning while maintaining security is fully homomorphic encryption. Due to constraints in operations on fully homomorphically encrypted data, non-arithmetic functions used in deep learning must be approximated by polynomials. Until now, the degrees of approximation polynomials with composite minimax polynomials have been uniformly set across layers, which poses challenges for effective network designs on fully homomorphic encryption. This study theoretically proves that setting different degrees of approximation polynomials constructed by composite minimax polynomial in each layer does not pose any issues in the inference on convolutional neural networks.

Security performance analysis of SIMO relay systems over Composite Fading Channels

  • Sun, Jiangfeng;Bie, Hongxia;Li, Xingwang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.6
    • /
    • pp.2649-2669
    • /
    • 2020
  • In this paper, we analyze the secrecy performance of single-input multiple-output (SIMO) relay systems over κ-μ shadowed fading channels. Based on considering relay model employing decode-and-forward (DF) protocol, two security evaluation metrics, namely, secure outage probability (SOP) and probability of strictly positive secrecy capacity (SPSC) are studied, for which closed-form analytical expressions are derived. In addition, Monte Carlo results prove the validity of the theoretical derivation. The simulation results confirm that the factors that enhance the security include large ratio of (μD, μE), (mD, mE), (LD, LE) and small ratio of (kD, kE) under the high signal-to-noise ratio regime.

A Nature-inspired Multiple Kernel Extreme Learning Machine Model for Intrusion Detection

  • Shen, Yanping;Zheng, Kangfeng;Wu, Chunhua;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.2
    • /
    • pp.702-723
    • /
    • 2020
  • The application of machine learning (ML) in intrusion detection has attracted much attention with the rapid growth of information security threat. As an efficient multi-label classifier, kernel extreme learning machine (KELM) has been gradually used in intrusion detection system. However, the performance of KELM heavily relies on the kernel selection. In this paper, a novel multiple kernel extreme learning machine (MKELM) model combining the ReliefF with nature-inspired methods is proposed for intrusion detection. The MKELM is designed to estimate whether the attack is carried out and the ReliefF is used as a preprocessor of MKELM to select appropriate features. In addition, the nature-inspired methods whose fitness functions are defined based on the kernel alignment are employed to build the optimal composite kernel in the MKELM. The KDD99, NSL and Kyoto datasets are used to evaluate the performance of the model. The experimental results indicate that the optimal composite kernel function can be determined by using any heuristic optimization method, including PSO, GA, GWO, BA and DE. Since the filter-based feature selection method is combined with the multiple kernel learning approach independent of the classifier, the proposed model can have a good performance while saving a lot of training time.

Desalination performance of Al2O3 positively charged nanofiltration composite membrane

  • Li, Lian;Zhang, Xiating;Li, Lufen;Yang, Zhongcao;Li, Yuan
    • Membrane and Water Treatment
    • /
    • v.13 no.2
    • /
    • pp.105-110
    • /
    • 2022
  • Al2O3 positively charged nanofiltration composite membrane was successfully prepared with aluminate coupling agent (ACA) as modifier, sodium bisulfite (NaHSO3) and potassium persulfate (K2S2O8) as initiator and methacryloyloxyethyl trimethylammonium chloride (DMC) as crosslinking monomer. The surface of the membrane before grafting and after polymerization were characterized by SEM and FT-IR. Three factor and three-level orthogonal experiments were designed to explore the optimal conditions for membrane preparation, and the optimal group was successfully prepared. The filtration experiments of different salt solutions were carried out, and the retention molecular weight was determined by polyethylene glycol (PEG). The results showed that the polymerization temperature had the greatest effect on the rejection rate, followed by the reaction time, and the concentration of DMC had the least effect on the rejection rate. The rejection rates of CaCl2, MgSO4, NaCl and Na2SO4 in the optimal group were 83.8%, 81.3%, 28.1% and 23.6% (average value), respectively. The molecule weight cut-off of 90% (MWCO) of the optimal group was about 460, which belongs to nanofiltration membrane.

DPA-Resistant Low-Area Design of AES S-Box Inversion (일차 차분 전력 분석에 안전한 저면적 AES S-Box 역원기 설계)

  • Kim, Hee-Seok;Han, Dong-Guk;Kim, Tae-Hyun;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.21-28
    • /
    • 2009
  • In the recent years, power attacks were widely investigated, and so various countermeasures have been proposed, In the case of block ciphers, masking methods that blind the intermediate values in the algorithm computations(encryption, decryption, and key-schedule) are well-known among these countermeasures. But the cost of non-linear part is extremely high in the masking method of block cipher, and so the inversion of S-box is the most significant part in the case of AES. This fact make various countermeasures be proposed for reducing the cost of masking inversion and Zakeri's method using normal bases over the composite field is known to be most efficient algorithm among these masking method. We rearrange the masking inversion operation over the composite field and so can find duplicated multiplications. Because of these duplicated multiplications, our method can reduce about 10.5% gates in comparison with Zakeri's method.

Area-Optimized Multi-Standard AES-CCM Security Engine for IEEE 802.15.4 / 802.15.6

  • Choi, Injun;Kim, Ji-Hoon
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.16 no.3
    • /
    • pp.293-299
    • /
    • 2016
  • Recently, as IoT (Internet of Things) becomes more important, low cost implementation of sensor nodes also becomes critical issues for two well-known standards, IEEE 802.15.4 and IEEE 802.15.6 which stands for WPAN (Wireless Personal Area Network) and WBAN (Wireless Body Area Network), respectively. This paper presents the area-optimized AES-CCM (Advanced Encryption Standard - Counter with CBC-MAC) hardware security engine which can support both IEEE 802.15.4 and IEEE 802.15.6 standards. First, for the low cost design, we propose the 8-bit AES encryption core with the S-box that consists of fully combinational logic based on composite field arithmetic. We also exploit the toggle method to reduce the complexity of design further by reusing the AES core for performing two operation mode of AES-CCM. The implementation results show that the total gate count of proposed AES-CCM security engine can be reduced by up to 42.5% compared to the conventional design.

Study on Optimum Design for constitution part of Composite Insulator (Composite Insulator 구성 부품에 대한 최적 설계 연구)

  • Chung, Young-Soo;Choi, Sung-Man;Jang, Yoon-Ki;Lee, Dong-Woen;Kim, Jeong-Bae
    • Proceedings of the KSME Conference
    • /
    • 2008.11a
    • /
    • pp.1181-1186
    • /
    • 2008
  • Insulators which are used in the domestic electrical industries are mostly depended on importation from some advance countries. Even though insulators which are made of ceramic material have been mostly used domestically, the ratio of usage on composite insulators is recently being increased because of difficulties in manufacturing and high cost regarding ceramic stuffs. In this research, we are trying to develop the composite insulators which are very efficient in insulation regardless of the matter of weight. Even though the technique of manufacturing composite insulator are quite generalized worldwide at the moment, one of the most important issue is to keep security on the know-how that an ingredient of insulated material named 'SF6 gas' is included. Therefore, The aim of this paper is to improve the bonding force and air tight property between two components of composite insulator, Flange and FRP Tube.

  • PDF

A Study on Vulnerability Analysis Methodology for Composite Security Product Evaluation (합성형 정보보호제품 평가를 위한 취약성 분석 방법 개발에 관한 연구)

  • Kim, Seok-Soo;Song, Jae-Gu
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.19-24
    • /
    • 2008
  • Common Criteria is a standard to estimate safety of information protection product such as network-level firewall system and intrusion detection system. Recently, CC version is changed from CC v.2.3 to CC v.3.1. CC v.3.1 estimation methodology requires a secured dictionary accomodation preparation for information protection product. In this research, progressed CC v3 base composition product test and research about vulnerability analysis method. Further, this paper presents specific plan sorting composition style information protection product examination methodology to existing principle and detailed methodology.

  • PDF

New Techniques for Anonymous HIBE with Short Ciphertexts in Prime Order Groups

  • Lee, Kwang-Su;Lee, Dong-Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.968-988
    • /
    • 2010
  • Anonymous hierarchical identity based encryption (HIBE) is an extension of identity based encryption (IBE) that can use an arbitrary string like an e-mail address for a public key, and it additionally provide the anonymity of identity in ciphertexts. Using the anonymous HIBE schemes, it is possible to construct anonymous communication systems and public key encryption with keyword search. This paper presents an anonymous HIBE scheme with constant size ciphertexts under prime order symmetric bilinear groups, and shows that it is secure under the selective security model. Previous anonymous HIBE schemes were constructed to have linear size ciphertexts, to use composite order bilinear groups, or to use asymmetric bilinear groups that is a special type of bilinear groups. Our construction is the first efficient anonymous HIBE scheme that has constant size ciphertexts and that uses prime order symmetric bilinear groups. Compared to the previous scheme of composite order bilinear groups, ours is ten times faster. To achieve our construction, we first devise a novel cancelable random blinding technique. The random blinding property of our technique provides the anonymity of our construction, and the cancellation property of our technique enables decryption.

An Efficient Implementation of AES Encryption Algorithm for CCTV Image Security (CCTV 영상보안 위한 AES 암호 알고리듬의 효율적인 구현)

  • Kang, Min-Sup
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.2
    • /
    • pp.1-6
    • /
    • 2021
  • In this paper, an efficient implementation of AES encryption algorithm is presented for CCTV image security using C# language. In this approach, an efficient S-Box is first designed for reducing the computation time which is required in each round process of AES algorithm, and then an CCTV image security system is implemented on the basis of this algorithm on a composite field GF(((22)2)2). In addition, the shared S-Box structure is designed for realizing the minimized memory space, which is used in each round transformation and key scheduling processes. Through performance evaluation, it was confirmed that the proposed method is more efficient than the existing method. The proposed CCTV system in C# language using Visual studio 2010.