• Title/Summary/Keyword: FIPS

Search Result 43, Processing Time 0.02 seconds

Testing the Validity and Reliability of FIPS(Face Interval Pain Scale) with Children림s Pain from Intramuscular Injection (환아에게 적용한 얼굴그림 동통척도의 타당도 및 신뢰도 연구)

  • 김주희;김분한
    • Journal of Korean Academy of Nursing
    • /
    • v.24 no.3
    • /
    • pp.461-472
    • /
    • 1994
  • The main purpose of this study was to test the validity and reliability of FIPS as an assessment tool for pain in children. The subject were 81 children whose ages ranged from 3 to 14 years old who were experiencing pain from an intramuscular injection. 40 were being seen in a local primary hospital and 41 in a university hospital. The data were collected in two settings at a 6 month interval, the first was on Nov. 5th 1991 in a local clinic by one doctor, the second was on May 1st. 1992 in a university hospital by two nurse. McGrath's(1985) face interval cards and weight box scale which is a numeral scale that contains from one to five boxes of cards were used as measures. To analyze the subject's ability to use the face scale and weight box scale, statistical frequency was employed. To determine the difference in the rated pain in-tensity on the face interval scale and the weight box, Pearson correlation coefficient and t-test were employed. To compare the difference in the rated pain intensity of the face interval scale and the weight box scale according to subject's general characteristics, X²-test was employed. The findings were as follows : 1. The subject's ages were from 3 to 14 with a mean age of 8.3 years old. There were 54(66.7%) male children and 27(33.3%) female children. 2. The number of subjects who correctly displayed cards ranging from none to severe pain was 66(81.5%) and the number who correctly compared two cards 3 times was 73(90.l%). 3. Correlation coefficients between each level card of the FIPS and WBS (Weight Box Scale) were r=.52∼.80 P<0.01. 4. There was no statistical difference in rating of the intensity on the FIPS and WBS.(t=1.12∼l.02, P<0.22∼0.45). 5. The differences in rating pain intensity according to the children's general characteristics were re-lated to age(X²=8.94, P<0.05), but not to sex (X²=0.23, P=0.80).

  • PDF

The Novel Efficient Dual-field FIPS Modular Multiplication

  • Zhang, Tingting;Zhu, Junru;Liu, Yang;Chen, Fulong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.2
    • /
    • pp.738-756
    • /
    • 2020
  • The modular multiplication is the key module of public-key cryptosystems such as RSA (Rivest-Shamir-Adleman) and ECC (Elliptic Curve Cryptography). However, the efficiency of the modular multiplication, especially the modular square, is very low. In order to reduce their operation cycles and power consumption, and improve the efficiency of the public-key cryptosystems, a dual-field efficient FIPS (Finely Integrated Product Scanning) modular multiplication algorithm is proposed. The algorithm makes a full use of the correlation of the data in the case of equal operands so as to avoid some redundant operations. The experimental results show that the operation speed of the modular square is increased by 23.8% compared to the traditional algorithm after the multiplication and addition operations are reduced about (s2 - s) / 2, and the read operations are reduced about s2 - s, where s = n / 32 for n-bit operands. In addition, since the algorithm supports the length scalable and dual-field modular multiplication, distinct applications focused on performance or cost could be satisfied by adjusting the relevant parameters.

Analysis of Post Processing Characteristics of Random Number Generator based Hardware Noise Source (하드웨어 잡음원 기반의 난수발생기의 사후처리 특성 분석)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.2
    • /
    • pp.755-759
    • /
    • 2012
  • In this paper, it is about random number generator, which is based on hardware is utilized in medical science and game area. The Intel presents guideline of security level about hardware based true random number generator. At hardware based random number generator, the various test items, that are included in test suits as NIST statistical test, FIPS140-1, is applied. In this paper, it experiments about degree extent of randomness variation from filter scheme effects, which is applied in output stream of hardware noise source.

A Block Cipher Algorithm based on Cellular Automata (셀룰라 오토마타를 이용한 블록 암호 알고리즘)

  • 이준석;장화식;이경현
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.6
    • /
    • pp.665-673
    • /
    • 2002
  • In this paper, we introduce cellular automata and propose a new block cipher algorithm based on cellular automata. For the evaluation of performance and security, we compare the results of the proposed algorithm with them of the standard block ciphers such as DES, Rijndael regarding on avalanche effects and processing time, and analyze the differential cryptanalysis for a reduction version of the proposed algorithm. In addition, we perform the statistical tests in FIPS PUB 140-2(Federal Information Processing Standards Publication 140-2) for the output bit sequences of proposed algorithm to guarantee the randomness property.

  • PDF

A Stream Cipher using A Cellular Automata (셀룰라 오토마타를 이용한 스트림 암호)

  • 이준석;장화식;이경현
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.2
    • /
    • pp.191-197
    • /
    • 2002
  • In this paper, we propose a stream cipher using a cellular automata. For the security evaluation, we use the statistical tests suggested on the report of FIPS PUB 140-2 and additionally, we apply entropy test, linear complexity test and auto-correlation test which are popular statistical tests for the output sequences of stream ciphers.

  • PDF

ISO 비침투공격 시험방법론 표준화 동향

  • Park, Tae-Hwan;Park, Jin-Hyung;Jang, Sang-Woon
    • Review of KIISC
    • /
    • v.30 no.1
    • /
    • pp.7-12
    • /
    • 2020
  • 비침투보안은 암호모듈 검증제도와 CC 평가 등에서 암호 시스템이 만족해야 하는 보안 요구사항 중 하나이다. 최근 미국 CMVP 제도는 기존 FIPS 140-2 기반의 시험기준을 ISO/IEC 19790, 24759 기반의 FIPS 140-3으로 변경하고 있으며, 2020년 9월 22일부터 실제 시험에 적용할 예정이다. 이러한 변화와 더불어 ISO/IEC 19790, 24759의 비침투공격 보안 요구사항에 대한 구체적인 시험 방법, 시험 도구 요구사항, 시험 도구 설정 방식 등에 관한 표준이 ISO/IEC JTC 1/SC 27에 의해 ISO/IEC 17825와 20085-1, 2으로 각각 발간 혹은 표준 제정 진행중에 있다. 본 논문에서는 비침투보안 시험방법론과 관련된 ISO 표준인 ISO/IEC 17825와 20085-1, 2를 통해 비침투공격 시험방법론 표준화 동향에 대해 살펴보고자 한다.

A study on H/W generator with randomness of output random stream (출력난수열의 랜덤성을 고려한 H/W 발생기에 관한 연구)

  • 홍진근
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.5 no.4
    • /
    • pp.321-325
    • /
    • 2004
  • It is quite difficult to create an unbiased and stable random bit stream, as required for statistical randomness, when using a random generator with only a hardware component. In this paper, we studied to reduce the statistical property of the biased bit stream in the output of a real random number generator. The proposed scheme is enhanced the randomness of output bitstream, these test items are used by FIPS 140-1.

  • PDF

Fips : Dynamic File Prefetching Scheme based on File Access Patterns (Fips : 파일 접근 유형을 고려한 동적 파일 선반입 기법)

  • Lee, Yoon-Young;Kim, Chei-Yol;Seo, Dae-Wha
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.7
    • /
    • pp.384-393
    • /
    • 2002
  • A Parallel file system is normally used to support excessive file requests from parallel applications in a cluster system, whereas prefetching is useful for improving the file system performance. This paper proposes a new prefetching method, Fips(dynamic File Prefetching Scheme based on file access patterms), that is particularly suitable for parallel scientific applications and multimedia web services in a parallel file system. The proposed prefetching method introduces a dynamic prefetching scheme to predict data blocks precisely in run-time although the file access patterns are irregular. In addition, it includes an algorithm to determine whether and when the prefetching is performed using the current available I/O bandwidth. Experimental results confirmed that the use of the proposed prefetching policy in a parallel file system produced a higher file system performance.

Validation Testing Tool for Light-Weight Stream Ciphers (경량 스트림 암호 구현 적합성 검증 도구)

  • Kang Ju-Sung;Shin Hyun Koo;Yi Okyeon;Hong Dowon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.495-502
    • /
    • 2005
  • Cryptographic algorithm testing is performed to ensure that a specific algorithm implementation is implemented correctly and functions correctly. CMVP(Cryptographic Module Validation Program) of NIST in US is the well-known testing system that validates cryptographic modules to Federal Information Processing Standards (FIPS). There is no FIPS-approved stream cipher, and CMVP doesn't involve its validation testing procedure. In this paper we provide validation systems for three currently used light-weight stream ciphers: Bluetooth encryption algorithm E0, 3GPP encryption algorithm A5/3, and RC4 used for WEP and SSL/TLS Protocols. Moreover we describe our validation tools implemented by JAVA programing.