• 제목/요약/키워드: Composite Security

검색결과 104건 처리시간 0.022초

Improved Scalar Multiplication on Elliptic Curves Defined over $F_{2^{mn}}$

  • Lee, Dong-Hoon;Chee, Seong-Taek;Hwang, Sang-Cheol;Ryou, Jae-Cheol
    • ETRI Journal
    • /
    • 제26권3호
    • /
    • pp.241-251
    • /
    • 2004
  • We propose two improved scalar multiplication methods on elliptic curves over $F_{{q}^{n}}$ $q= 2^{m}$ using Frobenius expansion. The scalar multiplication of elliptic curves defined over subfield $F_q$ can be sped up by Frobenius expansion. Previous methods are restricted to the case of a small m. However, when m is small, it is hard to find curves having good cryptographic properties. Our methods are suitable for curves defined over medium-sized fields, that is, $10{\leq}m{\leq}20$. These methods are variants of the conventional multiple-base binary (MBB) method combined with the window method. One of our methods is for a polynomial basis representation with software implementation, and the other is for a normal basis representation with hardware implementation. Our software experiment shows that it is about 10% faster than the MBB method, which also uses Frobenius expansion, and about 20% faster than the Montgomery method, which is the fastest general method in polynomial basis implementation.

  • PDF

Bilinear Group에서 속성 은닉을 가지는 안전한 내적 암호화 방식 (Secure Inner Product Encryption Scheme with Attribute Hiding in Bilinear Groups)

  • 리프키 사디킨;박영호
    • 전자공학회논문지
    • /
    • 제51권1호
    • /
    • pp.57-70
    • /
    • 2014
  • 내적 암호화 방식은 비밀키와 암호문 사이에 파인 그레인 관계를 제공하는 암호학적 프리미티브이다. 본 논문은 완전한 속성 은닉 보호를 수행하는 새로운 IPE 방식을 제안한다. 제안한 IPE 방식은 합성 위수의 bilinear groups에 기반한다. 본 논문에서는 이중 암호화 시스템 체계를 사용하여 제안한 IPE의 완전한 속성 은닉 보호를 증명한다. 성능 분석에서 기존의 IPE 방식들과 제안한 IPE 방식의 연산량과 메모리 할당량을 비교한다.

Paillier의 확률 공개키 암호 방식의 효율적인 개선 (Improvement of Paillier Probabilistic Plumbic Key Cryptosystem for Efficiency)

  • 최덕환;조석향;최승복;원동호
    • 한국통신학회논문지
    • /
    • 제28권8C호
    • /
    • pp.756-764
    • /
    • 2003
  • 본 논문에서는 Paillier가 제안한 확률 공개키 암호 방식을 개선하였다. Paillier의 확률 공개키 암호 방식은 이산 대수 함수를 기반으로. 하고 있으며 메시지는 두 개의 이산 대수 함수의 모듈라 곱으로 계산되고, 이 중 하나는 주어진 공개키에 따른 고정된 값을 갖는다. 공개키를 적절히 선택함으로써 Paillier가 제안한 암호 방식을 개선하여 일방향성과 어의적 안전성을 유지하면서 효율적인 방식을 얻을 수 있다. 또한 이러한 공개키를 쉽게 구할 수 있는 방법도 제시하였다.

Efficient Masking Methods Appropriate for the Block Ciphers ARIA and AES

  • Kim, Hee-Seok;Kim, Tae-Hyun;Han, Dong-Guk;Hong, Seok-Hie
    • ETRI Journal
    • /
    • 제32권3호
    • /
    • pp.370-379
    • /
    • 2010
  • In this paper, we propose efficient masking methods for ARIA and AES. In general, a masked S-box (MS) block can be constructed in different ways depending on the implementation platform, such as hardware and software. However, the other components of ARIA and AES have less impact on the implementation cost. We first propose an efficient masking structure by minimizing the number of mask corrections under the assumption that we have an MS block. Second, to make a secure and efficient MS block for ARIA and AES, we propose novel methods to solve the table size problem for the MS block in a software implementation and to reduce the cost of a masked inversion which is the main part of the MS block in the hardware implementation.

Multi-Focus Image Fusion Using Transformation Techniques: A Comparative Analysis

  • Ali Alferaidi
    • International Journal of Computer Science & Network Security
    • /
    • 제23권4호
    • /
    • pp.39-47
    • /
    • 2023
  • This study compares various transformation techniques for multifocus image fusion. Multi-focus image fusion is a procedure of merging multiple images captured at unalike focus distances to produce a single composite image with improved sharpness and clarity. In this research, the purpose is to compare different popular frequency domain approaches for multi-focus image fusion, such as Discrete Wavelet Transforms (DWT), Stationary Wavelet Transforms (SWT), DCT-based Laplacian Pyramid (DCT-LP), Discrete Cosine Harmonic Wavelet Transform (DC-HWT), and Dual-Tree Complex Wavelet Transform (DT-CWT). The objective is to increase the understanding of these transformation techniques and how they can be utilized in conjunction with one another. The analysis will evaluate the 10 most crucial parameters and highlight the unique features of each method. The results will help determine which transformation technique is the best for multi-focus image fusion applications. Based on the visual and statistical analysis, it is suggested that the DCT-LP is the most appropriate technique, but the results also provide valuable insights into choosing the right approach.

합동작전환경의 추세와 적용방안 (Trends of Joint Operational Environment and their Implications)

  • 조규필
    • 안보군사학연구
    • /
    • 통권3호
    • /
    • pp.73-120
    • /
    • 2005
  • Today's world is generation of Transformation. The Term "Transformation" is widely used in many nations and international organizations such as U.S. and NATO to describe the course of change undertaken by militaries to respond to the new and emerging security environment. Transformation involves all elements of the defense enterprise including Operational Environment, Operational Concepts, Doctrine, Structure and Technologies, within a supportive Cultures context. An Operational Environment is defined as "a composite of conditions, circumstances, and influences that affect the employment of military forces and bear on the decisions of the unit commander." The context for developing future military concept and capability lies essentially within the anticipated boundaries of the operational environment in a collective sense. The joint operational environment is essential to the nation's defense. It describes volatile, complex, and dangerous environment in which the military personnel. organizations, and material will operate. Implications coming forth from joint Operational Environment are but a starting point - many others exist. More and better Implications will come forth as people think about massages of Operational Environment, experiment its characteristics, learn to deal with its threats and scenarios, apply their experience and judgement, and then consider what is required of Korean military doctrine, organizations, training and education, material development, and leadership for operations in the joint Operational Environment.

  • PDF

Concealed Policy and Ciphertext Cryptography of Attributes with Keyword Searching for Searching and Filtering Encrypted Cloud Email

  • Alhumaidi, Hind;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.212-222
    • /
    • 2022
  • There has been a rapid increase in the use of cloud email services. As a result, email encryption has become more commonplace as concerns about cloud privacy and security grow. Nevertheless, this increase in usage is creating the challenge of how to effectively be searching and filtering the encrypted emails. They are popular technologies of solving the issue of the encrypted emails searching through searchable public key encryption. However, the problem of encrypted email filtering remains to be solved. As a new approach to finding and filtering encrypted emails in the cloud, we propose a ciphertext-based encrypted policy attribute-based encryption scheme and keyword search procedure based on hidden policy ciphertext. This feature allows the user of searching using some encrypted emails keywords in the cloud as well as allowing the emails filter-based server toward filter the content of the encrypted emails, similar to the traditional email keyword filtering service. By utilizing composite order bilinear groups, a hidden policy system has been successfully demonstrated to be secure by our dual system encryption process. Proposed system can be used with other scenarios such as searching and filtering files as an applicable method.

페널 데이터모형을 적용한 소매업 매출액 결정요인 추정에 관한 연구 (Estimating the Determinants for the Sales of Retail Trade:A Panel Data Model Approach)

  • 김희철;신현철
    • 융합보안논문지
    • /
    • 제8권3호
    • /
    • pp.83-92
    • /
    • 2008
  • 소매업 매출액는 그룹(소매업)별, 시간별로 다양한 원인에 의해서 매출액 결정이 이루어지고 있어 복잡성을 띠고 있다. 본 연구에서는 복잡성을 띠고 있는 소매업 매출액의 제 변인들을 파악하기 위해 패널 데이터를 이용한 연구 모형을 설정하고 이를 통해 소매업 매출액에 결정적으로 영향을 미치는 제 변인에 대하여 조사, 분석, 검증한다. 본 연구는 7 그룹(백화점, 대형마트, 슈퍼마켓, 편의점, 기타종합소매점, 무점포판매점, 사이버쇼핑몰, 기타무점포판매점, 전문상품소매점)을 분석대상으로 하였다. 분석기간은 2005년 1월부터 2007년 12월 까지의 자료를 이용하였고. 소매업 판매액을 종속변수로 설정하고 종합주가지수, 사이버쇼핑몰 사업체수, 동행(경기)종합지수, 아파트매매가격지수, 고용률, 평균가동률, 소비자물가 지수를 변수로 투입하였다. 소매업 결정요인을 추정한 결과 동행(경기)종합지수와 아파트매매가격지수, 고용률, 제조업 평균가동률의 계수값이 각각 유의적인 정(+)의 영향을 미치는 것으로 나타나고 소비자물가지수는 부(-)의 영향을 미치는 것으로 나타났다. 종합주가지수와 사이버 쇼핑몰 사업체수는 매출액에 큰 영향으로 주지는 않은 것으로 나타났다.

  • PDF

Numerical investigation on seismic performance of reinforced rib-double steel plate concrete combination shear wall

  • Longyun Zhou;Xiaohu Li;Xiaojun Li
    • Nuclear Engineering and Technology
    • /
    • 제56권1호
    • /
    • pp.78-91
    • /
    • 2024
  • Double steel plate concrete composite shear wall (SCSW) has been widely utilized in nuclear power plants and high-rise structures, and its shear connectors have a substantial impact on the seismic performance of SCSW. Therefore, in this study, the mechanical properties of SCSW with angle stiffening ribs as shear connections were parametrically examined for the reactor containment structure of nuclear power plants. The axial compression ratio of the SCSW, the spacing of the angle stiffening rib arrangement and the thickness of the angle stiffening rib steel plate were selected as the study parameters. Four finite element models were constructed by using the finite element program named ABAQUS to verify the experimental results of our team, and 13 finite element models were established to investigate the selected three parameters. Thus, the shear capacity, deformation capacity, ductility and energy dissipation capacity of SCSW were determined. The research results show that: compared with studs, using stiffened ribs as shear connectors can significantly enhance the mechanical properties of SCSW; When the axial compression ratio is 0.3-0.4, the seismic performance of SCSW can be maximized; with the lowering of stiffener gap, the shear bearing capacity is greatly enhanced, and when the gap is lowered to a specific distance, the shear bearing capacity has no major affect; in addition, increasing the thickness of stiffeners can significantly increase the shear capacity, ductility and energy dissipation capacity of SCSW. With the rise in the thickness of angle stiffening ribs, the improvement rate of each mechanical property index slows down. Finally, the shear bearing capacity calculation formula of SCSW with angle stiffening ribs as shear connectors is derived. The average error between the theoretical calculation formula and the finite element calculation results is 8% demonstrating that the theoretical formula is reliable. This study can provide reference for the design of SCSW.

ABE 스킴을 활용한 효율적인 공모자 추적 및 제외 스킴 (An Efficient Public Trace and Revoke Scheme Using Augmented Broadcast Encryption Scheme)

  • 이문식;이주희;홍정대
    • 정보보호학회논문지
    • /
    • 제26권1호
    • /
    • pp.17-30
    • /
    • 2016
  • 본 논문에서는 효율적인 공개키 기반 공모자 추적 및 제외 스킴을 제안하고자 한다. 공모자 추적 및 제외 스킴은 암호 전송 스킴(Broadcast encryption scheme)에 공모자 추적과 제외 기능을 추가한 것으로 악의적인 사용자들이 유출한 개인키 또는 공모한 해적판 키를 시스템에서 제외함으로서 스킴의 안전성을 유지하는 것이다. 또한 제외 기능은 일부 사용자만을 위한 암호문을 만들 수 있어 다양한 응용 환경에 적용할 수 있는 스킴이다. 본 논문에서는 합성수 위수의 겹선형 군을 기반으로 설계된 스킴[Augmented broadcast encryption scheme]을 소수 위수의 겹선형 군을 기반으로 하는 스킴으로 변화시켰고, 효율성의 척도인 공개키, 개인키, 암호문의 크기를 크게 개선했다. 또한 제외 기능에 대한 분석을 통해 기존 논문의 제한적인 제외 기능을 충분한 제외 기능으로 확장하는 결과를 얻을 수 있었다. 본 논문에서 제안하는 스킴의 구조는 계층적 구조 또는 피라미드 구조를 갖는 우리나라 정부, 군 조직 등에 쉽게 적용 가능하다.