• Title/Summary/Keyword: Composite Security

Search Result 104, Processing Time 0.023 seconds

A Design of AES-based CCMP core for IEEE 802.11i Wireless LAN Security (IEEE 802.11i 무선 랜 보안을 위한 AES 기반 CCMP 코어 설계)

  • Hwang Seok-Ki;Kim Jong-Whan;Shin Kyung-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.6A
    • /
    • pp.640-647
    • /
    • 2006
  • This paper describes a design of AES-based CCMP(Counter mode with CBC-MAC Protocol) core for IEEE 802.11i wireless LAN security. To maximize the performance of CCMP core, two AES cores are used, one is the counter mode for data confidentiality and the other is the CBC node for authentication and data integrity. The S-box that requires the largest hardware in ARS core is implemented using composite field arithmetic, and the gate count is reduced by about 27% compared with conventional LUT(Lookup Table)-based design. The CCMP core was verified using Excalibur SoC kit, and a MPW chip is fabricated using a 0.35-um CMOS standard cell technology. The test results show that all the function of the fabricated chip works correctly. The CCMP processor has 17,000 gates, and the estimated throughput is about 353-Mbps at 116-MHz@3.3V, satisfying 54-Mbps data rate of the IEEE 802.11a and 802.11g specifications.

Study on gamma radiation attenuation and non-ionizing shielding effectiveness of niobium-reinforced novel polymer composite

  • Akman, Ferdi.;Ogul, H.;Ozkan, I.;Kacal, M.R.;Agar, O.;Polat, H.;Dilsiz, K.
    • Nuclear Engineering and Technology
    • /
    • v.54 no.1
    • /
    • pp.283-292
    • /
    • 2022
  • Advanced radiation applications have been widely used and extended to many fields. As a result of this fact, choosing an appropriate shielding material based on the radiation application has become vital. In this regard, the integration of elements into polymer composites has been investigated and contributed to the quantity and quality of radiation shielding materials. This study reports photon attenuation parameters and electromagnetic shielding effectiveness of a novel polymer composite prepared with a matrix reinforced with three different proportions (5, 10, and 15 wt%) of niobium content. Addition of Nb dopant improves both photon attenuation and electromagnetic shielding effectiveness for the investigated composites. Therefore, Nb(15%) polymer composite with highest concentration has been found to be the best absorber for ionizing and non-ionizing radiations. Consequently, the performed analyzes provide evidences that the prepared Nb-reinforced polymer composite could be effectively used as photon radiation attenuator and electromagnetic shielding material.

Efficient Hardware Architecture of SEED S-box for Smart Cards

  • Hwang, Joon-Ho
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.4 no.4
    • /
    • pp.307-311
    • /
    • 2004
  • This paper presents an efficient architecture that optimizes the design of SEED S-box using composite field arithmetic. SEED is the Korean standard 128-bit block cipher algorithm developed by Korea Information Security Agency. The nonlinear function S-box is the most costly operation in terms. of size and power consumption, taking up more than 30% of the entire SEED circuit. Therefore the S-box design can become a crucial factor when implemented in systems where resources are limited such as smart cards. In this paper, we transform elements in $GF(2^8)$ to composite field $GF(((2^2)^2)^2)$ where more efficient computations can be implemented and transform the computed result back to $GF(2^8)$. This technique reduces the S-box portion to 15% and the entire SEED algorithm can be implemented at 8,700 gates using Samsung smart card CMOS technology.

Probabilistic Security Analysis in Composite Power System Reliability (복합전력계통 신뢰도평가에 있어서 확률론적 안전도연구)

  • Kim, H.;Cha, J.;Kim, J.O.;Kwon, S.
    • Proceedings of the KIEE Conference
    • /
    • 2005.11b
    • /
    • pp.46-48
    • /
    • 2005
  • This paper discusses a probabilistic method for power system security assessment. The security analysis relates to the ability of the electric power systems to survive sudden disturbances such as electric short circuits or unanticipated loss of system elements. It consists of both steady state and dynamic security analyses, which are not two separate issues but should be considered together. In steady state security analysis including voltage security analysis, the analysis checks that the system is operated within security limits by OPF (optimal power flow) after the transition to a new operating point. Until now, many utilities have difficulty in including dynamic aspects due to computational capabilities. On the other hand. dynamic security analysis is required to ensure that the transition may lead to an acceptable operating condition. Transient stability, which is the ability of power systems to maintain synchronism when subjected to a large disturbance. is a principal component in dynamic security analysis. Usually any loss of synchronism may cause additional outages and make the present steady state analysis of the post-contingency condition inadequate for unstable cases. This is the reason for the need of dynamic studies in power systems. Probabilistic criterion can be used to recognize the probabilistic nature of system components while considering system security. In this approach. we do not have to assign any predetermined margin of safety. A comprehensive conceptual framework for probabilistic static and dynamic assessment is presented in this paper. The simulation results of the Western System Coordinating Council (WSCC) system compare an analytical method with Monte-Carlo simulation (MCS).

  • PDF

Efficient Anonymous Broadcast Encryption with Adaptive Security

  • Zhou, Fu-Cai;Lin, Mu-Qing;Zhou, Yang;Li, Yu-Xi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4680-4700
    • /
    • 2015
  • Broadcast encryption is an efficient way to distribute confidential information to a set of receivers using broadcast channel. It allows the broadcaster to dynamically choose the receiver set during each encryption. However, most broadcast encryption schemes in the literature haven't taken into consideration the receiver's privacy protection, and the scanty privacy preserving solutions are often less efficient, which are not suitable for practical scenarios. In this paper, we propose an efficient dynamic anonymous broadcast encryption scheme that has the shortest ciphertext length. The scheme is constructed over the composite order bilinear groups, and adopts the Lagrange interpolation polynomial to hide the receivers' identities, which yields efficient decryption algorithm. Security proofs show that, the proposed scheme is both secure and anonymous under the threat of adaptive adversaries in standard model.

Public Key Cryptosystem Based on Jordan Form (Jordan 형식을 이용한 공개키 암호체계)

  • Lee, Hee-Jung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.4
    • /
    • pp.101-105
    • /
    • 2005
  • Recently a new public key cryptosystem based on a diagonal matrix has been proposed by Zheng. This system uses eigenvalues as a long-term key and random numbers as session key generators. However, there are a couple of flaws in that system. In this paper, we propose a new algorithm in which those flaws are all fixed. Our scheme is based on modular equations over a composite and uses a matrix of Jordan form. We also analyze the security of it.

Analysis of the Importance and Priority of HRM Factors in Private Security (민간경비 인사업무의 중요도 및 우선순위에 대한 고찰)

  • Kwon, Jung-Eon
    • Korean Security Journal
    • /
    • no.56
    • /
    • pp.55-81
    • /
    • 2018
  • The purpose of this study is to find significant activities in human resource management (HRM) to solve growing-pains caused by the rapid external growth in private security business. To this end, we applied the HRM factors suggested by the National Job Capability Standard (NCS) to the private security and investigated the relative importance using the Analytic Hierarchy Process (AHP). The results were as follows. First, the importance of 4 HRM criteria in the private security was ranked in order of recruitment, operation, benefit, and retirement. Particularly, the relative importance of recruitment reached 63.8%. Second, the composite importance was calculated by dividing the 4 HRM criteria into 14 capability sub-criteria and 46 capability alternatives. As a result, personnel planning and hiring at the recruitment turned out as the areas that needed the most improvement. In addition, the operating and planning of education involved in the highest rank, 8th and 10th respectively. Based on these results, we suggested critical HRM factors for developing the private security business as well as proposed research directions and methods for further studies.

Production & Performance Assessment of Composite Material Flexible Propeller (복합재료 유연 프로펠러의 제작 및 성능 평가)

  • Lee, Sang-Gab;Byun, Joon-Hyung;Paik, Bu-Geun;Hyun, Beom-Soo
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.46 no.6
    • /
    • pp.667-674
    • /
    • 2009
  • The researches on the development of composite material underwater vehicle propeller have been actively attempted for the reduction of radiation noise with outstanding damping effects. Composite material propellers have almost been designed and produced by the foreign experts, and it is difficult to obtain the related informations about their flow, vibration, material characteristics because they are treated as the secrets with close relationship to the military technology, especially in the case of underwater vehicles. For the security of domestic manufacture of composite material propeller and the comparison and examination of its performance and radiation noise characteristics with those of German CONTUR composite material propeller, two propellers were self-produced according to the fiber weaving and array using compressible molding process and their self performances and radiation noise characteristics were measured. The mean fluctuations of blade tip of self-produced composite material propeller were increased and the radiation noises in the low frequency band were reduced compared to those of CONTUR, which could be estimated as the change of material characteristics and also be thought to be used for the future research informations.

Coordinated Control Strategy and Optimization of Composite Energy Storage System Considering Technical and Economic Characteristics

  • Li, Fengbing;Xie, Kaigui;Zhao, Bo;Zhou, Dan;Zhang, Xuesong;Yang, Jiangping
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.3
    • /
    • pp.847-858
    • /
    • 2015
  • Control strategy and corresponding parameters have significant impacts on the overall technical and economic characteristics of composite energy storage systems (CESS). A better control strategy and optimized control parameters can be used to improve the economic and technical characteristics of CESS, and determine the maximum power and stored energy capacity of CESS. A novel coordinated control strategy is proposed considering the coordination of various energy storage systems in CESS. To describe the degree of coordination, a new index, i.e. state of charge coordinated response margin of supercapacitor energy storage system, is presented. Based on the proposed control strategy and index, an optimization model was formulated to minimize the total equivalent cost in a given period for two purposes. The one is to obtain optimal control parameters of an existing CESS, and the other is to obtain the integrated optimal results of control parameters, maximum power and stored energy capacity for CESS in a given period. Case studies indicate that the developed index, control strategy and optimization model can be extensively applied to optimize the economic and technical characteristics of CESS. In addition, impacts of control parameters are discussed in detail.

A Design of AES-based CCMP Core for IEEE 802.11i Wireless LAN Security (IEEE 802.11i 무선 랜 보안을 위한 AES 기반 CCMP Core 설계)

  • Hwang Seok-Ki;Lee Jin-Woo;Kim Chay-Hyeun;Song You-Soo;Shin Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.4
    • /
    • pp.798-803
    • /
    • 2005
  • This paper describes a design of AES(Advanced Encryption Standard)-based CCMP core for IEEE 802.1li wireless LAN security. To maximize its performance, two AES cores ate used, one is for counter mode for data confidentiality and the other is for CBC(Cipher Block Chaining) mode for authentication and data integrity. The S-box that requires the largest hardware in AES core is implemented using composite field arithmetic, and the gate count is reduced by about $20\%$ compared with conventional LUT(Lookup Table)-based design. The CCMP core designed in Verilog-HDL has 13,360 gates, and the estimated throughput is about 168 Mbps at 54-MHz clock frequency. The functionality of the CCMP core is verified by Excalibur SoC implementation.