• Title/Summary/Keyword: ECC

Search Result 602, Processing Time 0.028 seconds

A Security SoC supporting ECC based Public-Key Security Protocols (ECC 기반의 공개키 보안 프로토콜을 지원하는 보안 SoC)

  • Kim, Dong-Seong;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.11
    • /
    • pp.1470-1476
    • /
    • 2020
  • This paper describes a design of a lightweight security system-on-chip (SoC) suitable for the implementation of security protocols for IoT and mobile devices. The security SoC using Cortex-M0 as a CPU integrates hardware crypto engines including an elliptic curve cryptography (ECC) core, a SHA3 hash core, an ARIA-AES block cipher core and a true random number generator (TRNG) core. The ECC core was designed to support twenty elliptic curves over both prime field and binary field defined in the SEC2, and was based on a word-based Montgomery multiplier in which the partial product generations/additions and modular reductions are processed in a sub-pipelining manner. The H/W-S/W co-operation for elliptic curve digital signature algorithm (EC-DSA) protocol was demonstrated by implementing the security SoC on a Cyclone-5 FPGA device. The security SoC, synthesized with a 65-nm CMOS cell library, occupies 193,312 gate equivalents (GEs) and 84 kbytes of RAM.

Mid- and Long Term Outcome of Fontan Procedure: Extracardiac Conduit Fontan versus Lateral Tunnel Fontan (폰탄 술식의 중장기 성적: 심장외 도관 술식과 가측터널 술식의 비교)

  • Kwak, Jae-Gun;Kim, Dong-Jung;Kim, Yong-Jin
    • Journal of Chest Surgery
    • /
    • v.40 no.12
    • /
    • pp.805-810
    • /
    • 2007
  • Background: This paper reviews our experience retrospectively to examine the clinical results and effectiveness of lateral tunnel (LT) and extracardiac conduit (ECC) Fontan procedures at a single institution. Material and Method: One hundred and sixty five Fontan procedures were performed (67 LT and 98 ECC) between January 1996 and December 2006. Preoperative and postoperative hemodynamic values, arrhythmia, hospital and intensive care unit stay, chest tube drain, morbidity and mortality were reviewed. Result: The overall operative mortality in the LT and ECC groups was 4.5% (3) and 2.0% (2), respectively. There was a significant difference in the immediate postoperative transpulmonary gradient (LT $8.5{\pm}2.5$ vs ECC $6.6{\pm}2.4$, p-value<0.001) and central venous pressure (LT $18.3{\pm}3.8$ vs ECC $15.6{\pm}2.4$, p-value=0.001) between the two groups. The mean follow-up in the LT and ECC groups was $74.1{\pm}31.5$ and $38.1{\pm}29.1$ months, respectively. There was one late death. The actuarial survival at 10 years in the LT and ECC groups was 92% and 89%, respectively. In arrhythmia, the ECC patients showed a slightly low incidence but the difference was not statistically significant. Conclusion: Both the LT and ECC Fontan procedures showed comparable early and mid-term outcomes in terms of the surgical morbidity and mortality, postoperative hemodynamics, and mid-term survival. The ECC Fontan procedure reduces the risk of arrhythmia in the follow up period.

Chemicals for the Control of Streptomycin-resistant Tobacco Hollow Stalk Pathogen, Erwinia carotouora subsp. carotovora (Streptomycin 내성 담배줄기속썩음병균 방제약제 선발)

  • 강여규
    • Journal of the Korean Society of Tobacco Science
    • /
    • v.18 no.1
    • /
    • pp.60-65
    • /
    • 1996
  • Chemicals including antibiotics and bactericides were screened for suppression of streptomycin-resistant Erwinia cmutouom subsp. cmutovom (Ecc) strains in laboratory and field conditions. Oxytetracycline, ethoquinolac and dichlorophen suppressed the growth of streptomycin-resistant Ecc strains in vitro. Fractional inhibitory concentration (FIC) indices of oxytetracycline and ethoquinolac mixed with streptomycin against the Ecc strains were equal to and less than one, respectively. Consequently the efficacy of those chemicals in mixture with sorptomycin were non-antagonistic But that of dichlorophen mixed with streptomycin was more than one, therefore the efficacy of the mixture was antagonistic. Spray of oxyteoucycline, ethoquinolac and agrimycin-100 on the topped burley tobacco plants was efficacious in reducing tobacco hollow stalk at the same level of sorptomycin treatment in three-year field trials, which suggests that those are promising chemicals to be alternative to streptomycin for control of tobacco hollow stalk.

  • PDF

Design of ECC Calculator for Digital Transmission Content Protection(DTCP) (디지털 컨텐츠 보호를 위한 DTCP용 타원곡선 암호(ECC) 연산기의 구현)

  • Kim Eui-Seok;Ryu Tae-Gyu;Jeong Yong-Jin
    • Proceedings of the IEEK Conference
    • /
    • 2004.06a
    • /
    • pp.47-50
    • /
    • 2004
  • In this paper, we implement an Elliptic Curve Cryptosystem(ECC) processor for DTCP. Because DTCP(Digital Transmission Content Protection) uses GF(p), where p is a 160-bit prime integer, we design a scalar multiplier based on GF(p). The scalar multiplier consists of a modular multiplier and an adder. The multiplier uses montgomery algorithm which is implemented with CSA(Carry-save Adder) and CLA(Carry-lookahead Adder). Our new scalar multiplier has been synthesized using Samsung 0.18 um CMOS technology and the maximum operation frequency is estimated 98 MHz, with the size about 65,000 gates. The resulting performance is 29.6 kbps, that is, it takes 5.4 msec to process a 160-bit data frame. We assure that this performance is enough to be used for digital signature, encryption/decryption, and key exchanges in real time environments.

  • PDF

Design and Implement of Secure Instant Message System Using ECC of ElGamal Method on Public Key Infrastructure (공개키 기반 구조에서 ElGamal 방식의 ECC를 이용한 안전한 인스턴트 메시지 시스템 설계 및 구현)

  • Park Su-Young;Jung Chang-Yeoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.955-958
    • /
    • 2006
  • 초고속인터넷이 널리 보급되면서 최근 메신저 서비스(Messenger Service)를 이용하는 사용자가 폭발적으로 증가하고, 해킹 기술의 발달로 인하여 메신저를 통하여 전달되는 메시지들이 악의의 사용자에게 쉽게 노출될 수 있는 가증서도 커지고 있다. 본 논문에서는 인스턴트 메신저의 안전한 통신을 위해 인증서를 이용한 인스턴트 메신저 프로토콜에 대해 설계하였다. 또한 메신저 서비스에서의 메시지 보안을 구현함에 있어서 공개키 암호 알고리즘의 연산수행시간을 단축하기 위해 ElGamal 방식의 ECC(Elliptic Curve Cryptography) 알고리즘을 사용하고, 사용자 그룹 단위의 암호화를 위해 그룹별로 타원곡선과 그 위에 있는 임의의 점을 선택하여 다른 그룹과 구별하였다.

  • PDF

Tailoring ECC for Special Attributes: A Review

  • Li, Victor C.
    • International Journal of Concrete Structures and Materials
    • /
    • v.6 no.3
    • /
    • pp.135-144
    • /
    • 2012
  • This article reviews the tailoring of engineered cementitious composites (ECC), a type of high performance fiber reinforced cementitious composites with a theoretical design basis, for special attributes or functions. The design basis, a set of analytic tools built on micromechanics, provides guidelines for tailoring of fiber, matrix, and fiber/matrix interfaces to attain tensile ductility in ECC. If conditions for controlled multiple cracking are disturbed by the need to introduce ingredients to attain a special attribute or function, micromechanics then serve as a systematic and rational means to efficiently recover composite tensile ductility. Three examples of ECCs with attributes of lightweight, high early strength, and self-healing functions, are used to illustrate these tailoring concepts. The fundamental approach, however, is broadly applicable to a wide variety of ECCs designed for targeted fresh and/or hardened characteristics required for specific applications.

Design of RFID Security System Using SNEP and ECC (SNEP와 ECC를 이용한 RFID 보안 시스템 설계)

  • Park, Sang-Hyun;Han, Soo;Choi, Yong-Sik;John, Young-Jun;Shin, Seoung-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10c
    • /
    • pp.503-506
    • /
    • 2006
  • IT 기술의 발달로 인간의 편이를 위한 많은 기술들이 생겨나고 21세기 IT분야만이 아닌 사회 전 분야에서 가장 주목을 받는 기술이 유비쿼터스이다. 유비쿼터스는 사용자의 인식없이 컴퓨터와 통신을 하는 기술이다. 주거환경의 개선 부분이나 구매의 편리를 위한 부분에서 가장 많은 적용이 시도 되고 있다. 하지만 무분별한 인식에 의한 개인의 프라이버시와 여러 가지 보안문제가 야기되고 있다. 일반 RFID 분야에서는 보안이 필요 없는 부분도 있지만 RFID가 더 많은 분야에서 시도가 되려면 보안요소가 꼭 필요하다. 본 논문에서는 저 전력과 낮은 메모리에서 사용하기 위해서 무선에서 사용하고 있는 보안 모듈인 SNEP와 ECC알고리즘을 RFID에 적용할 수 있는 시스템을 설계 및 제안한다.

  • PDF

A study on secure piconet using ECC (ECC를 이용한 안전한 piconet에 관한 연구)

  • Seo, Dae-Hee;Lee, Im-Yeong;Kim, Yeong-Baek;Kim, Hae-Suk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.911-914
    • /
    • 2001
  • 정보통신의 급속한 발전으로 다양한 정보의 요구는 기존 유선 서비스 환경에서 개인 중심의 무선 서비스 환경으로 변화하고 있다. 그 중에서도 최근 근거리 무선 통신의 중심으로 주목받고 있는 Bluetooth는 이러한 사용자의 요구에 의해 발생되어 많은 연구가 진행중에 있다. 본 논문에서는 Bluetooth Master와 Slave로 이루어진 하나의 작은 네트워크인 piconet 형성에서부터 유지까지의 보안적 취약점을 분석한 뒤 이를 기반으로 ECC를 적용한 보다 안전하면서 효율적인 Bluetooth piconet 형성 과정 및 유지 과정을 제안하였다.

  • PDF

Digital holographic memory system using angular multiplexing (각도 다중화를 이용한 디지털 홀로그램의 저장 및 재생에 관한 연구)

  • Kim, Young-Hoon;Yang, Byung-Choon;Lee, Byoung-Ho;Park, Joo-Youn
    • Proceedings of the KIEE Conference
    • /
    • 1998.11c
    • /
    • pp.984-986
    • /
    • 1998
  • The volume holographic memory system suffers from the crosstalk noise. We study use of error correction coding(ECC) and angular multiplexing for digital holographic memory(DHM) system. The analog image is encoded to binary images by ECC. Binary images are stored using angular multiplexing in DHM. The retrieved binary images are decoded by ECC. The bit error-rate is measured for perspective of the DHM system.

  • PDF

Study of the power consumption of ECC circuits designed by various evolution strategies (다양한 진화 알고리즘으로 설계된 ECC회로들의 전력소비 연구)

  • Lee, Hee-Sung;Kim, Eun-Tai
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.1135-1136
    • /
    • 2008
  • Error correcting codes (ECC) are widely used in all types of memory in industry, including caches and embedded memory. The focus in this paper is on studying of power consumption in memory ECCs circuitry that provides single error correcting and double error detecting (SEC-DED) designed by various evolution strategies. The methods are applied to two commonly used SEC-DED codes: Hamming and odd column weight Hsiao codes. Finally, we conduct some simulations to show the performance of the various methods.

  • PDF