• 제목/요약/키워드: Composite Security

검색결과 106건 처리시간 0.022초

다양한 차수의 합성 미니맥스 근사 다항식이 완전 동형 암호 상에서의 컨볼루션 신경망 네트워크에 미치는 영향 (The Impact of Various Degrees of Composite Minimax ApproximatePolynomials on Convolutional Neural Networks over Fully HomomorphicEncryption)

  • 이정현;노종선
    • 정보보호학회논문지
    • /
    • 제33권6호
    • /
    • pp.861-868
    • /
    • 2023
  • 보안을 유지하는 가운데 딥 러닝을 이용하여 데이터 분석 결과를 제공하는 서비스의 핵심적인 기술 중의 하나로 완전 동형 암호가 있다. 완전 동형 암호화된 데이터 간의 연산의 제약으로 인해 딥 러닝에 사용되는 비산술 함수를 다항식으로 근사해야 한다. 현재까지는 합성 미니맥스 다항식을 사용하여 비산술 함수를 근사한 다항식을 컨볼루션 뉴럴 네트워크에 적용했을 때 계층별로 같은 차수의 다항식만 적용하였는데, 이는 완전 동형 암호를 위한 효과적인 네트워크의 설계에 어려움을 준다. 본 연구는 합성 미니맥스 다항식으로 설계한 근사 다항식의 차수를 계층별로 서로 다르게 설정하여도 컨볼루션 뉴럴 네트워크에서 데이터의 분석에 문제가 없음을 이론적으로 증명하였다.

Security performance analysis of SIMO relay systems over Composite Fading Channels

  • Sun, Jiangfeng;Bie, Hongxia;Li, Xingwang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권6호
    • /
    • pp.2649-2669
    • /
    • 2020
  • In this paper, we analyze the secrecy performance of single-input multiple-output (SIMO) relay systems over κ-μ shadowed fading channels. Based on considering relay model employing decode-and-forward (DF) protocol, two security evaluation metrics, namely, secure outage probability (SOP) and probability of strictly positive secrecy capacity (SPSC) are studied, for which closed-form analytical expressions are derived. In addition, Monte Carlo results prove the validity of the theoretical derivation. The simulation results confirm that the factors that enhance the security include large ratio of (μD, μE), (mD, mE), (LD, LE) and small ratio of (kD, kE) under the high signal-to-noise ratio regime.

A Nature-inspired Multiple Kernel Extreme Learning Machine Model for Intrusion Detection

  • Shen, Yanping;Zheng, Kangfeng;Wu, Chunhua;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권2호
    • /
    • pp.702-723
    • /
    • 2020
  • The application of machine learning (ML) in intrusion detection has attracted much attention with the rapid growth of information security threat. As an efficient multi-label classifier, kernel extreme learning machine (KELM) has been gradually used in intrusion detection system. However, the performance of KELM heavily relies on the kernel selection. In this paper, a novel multiple kernel extreme learning machine (MKELM) model combining the ReliefF with nature-inspired methods is proposed for intrusion detection. The MKELM is designed to estimate whether the attack is carried out and the ReliefF is used as a preprocessor of MKELM to select appropriate features. In addition, the nature-inspired methods whose fitness functions are defined based on the kernel alignment are employed to build the optimal composite kernel in the MKELM. The KDD99, NSL and Kyoto datasets are used to evaluate the performance of the model. The experimental results indicate that the optimal composite kernel function can be determined by using any heuristic optimization method, including PSO, GA, GWO, BA and DE. Since the filter-based feature selection method is combined with the multiple kernel learning approach independent of the classifier, the proposed model can have a good performance while saving a lot of training time.

Desalination performance of Al2O3 positively charged nanofiltration composite membrane

  • Li, Lian;Zhang, Xiating;Li, Lufen;Yang, Zhongcao;Li, Yuan
    • Membrane and Water Treatment
    • /
    • 제13권2호
    • /
    • pp.105-110
    • /
    • 2022
  • Al2O3 positively charged nanofiltration composite membrane was successfully prepared with aluminate coupling agent (ACA) as modifier, sodium bisulfite (NaHSO3) and potassium persulfate (K2S2O8) as initiator and methacryloyloxyethyl trimethylammonium chloride (DMC) as crosslinking monomer. The surface of the membrane before grafting and after polymerization were characterized by SEM and FT-IR. Three factor and three-level orthogonal experiments were designed to explore the optimal conditions for membrane preparation, and the optimal group was successfully prepared. The filtration experiments of different salt solutions were carried out, and the retention molecular weight was determined by polyethylene glycol (PEG). The results showed that the polymerization temperature had the greatest effect on the rejection rate, followed by the reaction time, and the concentration of DMC had the least effect on the rejection rate. The rejection rates of CaCl2, MgSO4, NaCl and Na2SO4 in the optimal group were 83.8%, 81.3%, 28.1% and 23.6% (average value), respectively. The molecule weight cut-off of 90% (MWCO) of the optimal group was about 460, which belongs to nanofiltration membrane.

일차 차분 전력 분석에 안전한 저면적 AES S-Box 역원기 설계 (DPA-Resistant Low-Area Design of AES S-Box Inversion)

  • 김희석;한동국;김태현;홍석희
    • 정보보호학회논문지
    • /
    • 제19권4호
    • /
    • pp.21-28
    • /
    • 2009
  • 전력분석 공격이 소개되면서 다양한 대응법들이 제안되었고 그러한 대응법들 중 블록 암호의 경우, 암/복호화 연산, 키 스케줄 연산 도중 중간 값이 전력 측정에 의해 드러나지 않도록 하는 마스킹 기법이 잘 알려져 있다. 블록 암호의 마스킹 기법은 비선형 연산에 대한 비용이 가장 크며, 따라서 AES의 경우 가장 많은 비용이 드는 연산은 S-box의 역원 연산이다. 이로 인해 마스킹 역원 연산에 대한 비용을 단축시키기 위해 다양한 대응법들이 제안되었고, 그 중 Zakeri의 방법은 복합체 위에서 정규 기저를 사용한 가장 효율적인 방법으로 알려져 있다. 본 논문에서는 복합체 위에서의 마스킹 역원 연산 방식을 변형, 중복되는 곱셈을 발견함으로써 기존 Zakeri의 방법보다 총 게이트 수가 10.5% 절감될 수 있는 마스킹 역원 방법을 제안한다.

Area-Optimized Multi-Standard AES-CCM Security Engine for IEEE 802.15.4 / 802.15.6

  • Choi, Injun;Kim, Ji-Hoon
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • 제16권3호
    • /
    • pp.293-299
    • /
    • 2016
  • Recently, as IoT (Internet of Things) becomes more important, low cost implementation of sensor nodes also becomes critical issues for two well-known standards, IEEE 802.15.4 and IEEE 802.15.6 which stands for WPAN (Wireless Personal Area Network) and WBAN (Wireless Body Area Network), respectively. This paper presents the area-optimized AES-CCM (Advanced Encryption Standard - Counter with CBC-MAC) hardware security engine which can support both IEEE 802.15.4 and IEEE 802.15.6 standards. First, for the low cost design, we propose the 8-bit AES encryption core with the S-box that consists of fully combinational logic based on composite field arithmetic. We also exploit the toggle method to reduce the complexity of design further by reusing the AES core for performing two operation mode of AES-CCM. The implementation results show that the total gate count of proposed AES-CCM security engine can be reduced by up to 42.5% compared to the conventional design.

Composite Insulator 구성 부품에 대한 최적 설계 연구 (Study on Optimum Design for constitution part of Composite Insulator)

  • 정용수;최성만;장윤기;이동원;김정배
    • 대한기계학회:학술대회논문집
    • /
    • 대한기계학회 2008년도 추계학술대회A
    • /
    • pp.1181-1186
    • /
    • 2008
  • Insulators which are used in the domestic electrical industries are mostly depended on importation from some advance countries. Even though insulators which are made of ceramic material have been mostly used domestically, the ratio of usage on composite insulators is recently being increased because of difficulties in manufacturing and high cost regarding ceramic stuffs. In this research, we are trying to develop the composite insulators which are very efficient in insulation regardless of the matter of weight. Even though the technique of manufacturing composite insulator are quite generalized worldwide at the moment, one of the most important issue is to keep security on the know-how that an ingredient of insulated material named 'SF6 gas' is included. Therefore, The aim of this paper is to improve the bonding force and air tight property between two components of composite insulator, Flange and FRP Tube.

  • PDF

합성형 정보보호제품 평가를 위한 취약성 분석 방법 개발에 관한 연구 (A Study on Vulnerability Analysis Methodology for Composite Security Product Evaluation)

  • 김석수;송재구
    • 융합보안논문지
    • /
    • 제8권3호
    • /
    • pp.19-24
    • /
    • 2008
  • 침입차단 시스템, 침입탐지 시스템 등 정보보호제품이 얼마나 안전하게 개발되고 구현되었는지 검증하기 위한 방안으로 공통평가기준(CC)를 제정 하여 제품을 평가한다. 이에 기존까지 적용된 CC v2.3에서 버전이 3.1로 전환이 되며 가장 큰 차이점인 정보보호 제품에 대한 평가방법론을 사전 확보하여 버전 3.1 수용 준비가 요구되고 있다. 이에 본 연구에서는 CC v3기반 합성제품 시험 및 취약성 분석 방법에 대한 연구를 진행하였다. 특히 합성형 정보보호제품 시험방법론을 기존원칙과 세부 방법론으로 분류하여 구체적 방안을 제시하고자 한다.

  • PDF

New Techniques for Anonymous HIBE with Short Ciphertexts in Prime Order Groups

  • Lee, Kwang-Su;Lee, Dong-Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제4권5호
    • /
    • pp.968-988
    • /
    • 2010
  • Anonymous hierarchical identity based encryption (HIBE) is an extension of identity based encryption (IBE) that can use an arbitrary string like an e-mail address for a public key, and it additionally provide the anonymity of identity in ciphertexts. Using the anonymous HIBE schemes, it is possible to construct anonymous communication systems and public key encryption with keyword search. This paper presents an anonymous HIBE scheme with constant size ciphertexts under prime order symmetric bilinear groups, and shows that it is secure under the selective security model. Previous anonymous HIBE schemes were constructed to have linear size ciphertexts, to use composite order bilinear groups, or to use asymmetric bilinear groups that is a special type of bilinear groups. Our construction is the first efficient anonymous HIBE scheme that has constant size ciphertexts and that uses prime order symmetric bilinear groups. Compared to the previous scheme of composite order bilinear groups, ours is ten times faster. To achieve our construction, we first devise a novel cancelable random blinding technique. The random blinding property of our technique provides the anonymity of our construction, and the cancellation property of our technique enables decryption.

CCTV 영상보안 위한 AES 암호 알고리듬의 효율적인 구현 (An Efficient Implementation of AES Encryption Algorithm for CCTV Image Security)

  • 강민섭
    • 한국인터넷방송통신학회논문지
    • /
    • 제21권2호
    • /
    • pp.1-6
    • /
    • 2021
  • 본 논문에서는 C# 언어를 이용하여 CCTV 영상보안 시스템의 효율적인 구현을 제안한다. 제안한 방법에서는 AES 알고리듬의 각 라운드 과정에서 요구되는 지연시간의 최소화를 위한 합성체 기반의 S-Box를 설계하고, 이를 기반으로 한 영상보안 시스템을 GF(((22)2)2) 상에서 구현한다. 또한, 메모리 공간의 최소화를 위해서 각 라운드 변환 및 키 스케쥴링 과정에서 필요한 S-Box를 공동으로 사용하도록 설계한다. 성능평가를 통하여 기존의 방법 보다 제안한 방법이 보다 효율적임을 확인하였다. 제안한 CCTV 영상보안 시스템은 Visual Studio 2010을 사용하여 C# 언어로 구현하였다.