• Title/Summary/Keyword: Function Block

Search Result 1,105, Processing Time 0.025 seconds

An Efficient Hardware Implementation of Whirlpool Hash Function (Whirlpool 해쉬 함수의 효율적인 하드웨어 구현)

  • Park, Jin-Chul;Shin, Kyung-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.263-266
    • /
    • 2012
  • This paper describes an efficient hardware implementation of Whirlpool hash function as ISO/IEC 10118-3 standard. Optimized timing is achieved by using pipelined small LUTs, and Whirlpool block cipher and key schedule have been implemented in parallel for improving throughput. In key schedule, key addition is area-optimized by using inverters and muxes instead of using rom and xor gates. This hardware has been implemented on Virtex5-XC5VSX50T FPGA device. Its maximum operating frequency is about 151MHz, and throughput is about 950Mbps.

  • PDF

Effects of Compression Materials on Hand Dexterity in the 40's Healthy Subjects: A Preliminary Study

  • Rhee, Hyeon-Sook;Yu, Jae-Ho;Kim, Sung-Joong
    • The Journal of Korean Physical Therapy
    • /
    • v.23 no.6
    • /
    • pp.43-47
    • /
    • 2011
  • Purpose: The aim of this preliminary study was to use hand function tests to Hand dexterity levels provided by the type of compression garment and compression bandages in asymptomatic subjects and to collect baseline data for the comparison of hand functions in the patients with chronic arm lymphedema. Methods: The subjects of this study were 32 healthy volunteer female with a mean age of 45.8 years. Grip strength and hand functions were tested in three conditions-no compression, compression garment, and compression bandages-using the nine-hole peg test (NHPT), the box and block test (B&BT), Minnesota Manual Dexterity test (MMDT), and the hand-held Jamar dynamometer. Results: The grip strength was significantly low in the bandage condition (p<0.05). The performance in both compression groups (i.e., bandage and compression garment) decreased as the thickness of the compression material increased (p<0.05). Conclusion: The findings of this study suggest that grip strength and hand function scores are influenced by the characteristics of the compression applied. Future study is needed to determine the level of hand function between patients with chronic arm lymphedema and healthy individuals.

Analysis of Dynamic Characteristics on Condenser for the Control of Air Conditioning Systems (공조기 제어를 위한 응축기의 동특성 해석)

  • Kim, J.D.;Yoon, J.I.;Higuchi, K.
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.8 no.3
    • /
    • pp.386-396
    • /
    • 1996
  • The dynamic characteristics of a condenser are numerically studied for the control of air-conditioning systems. The important factors, such as the refrigerant flow rate and refrigerant temperature, air velocity and air temperature at the condenser inlet, are incorporated into the analysis. This study was focused on the analysis of dynamic responses by transfer function method in the condenser. Block diagrams were made through analytic transfer function, and dynamic responses are evaluated on Bode diagrams in the frequency response. These results may be used for determining an optimum design parameters in an actual component and total systems. Also, the mathematical models, frequency response and steady state response may be used to increase understanding, to obtain useful information for its commercialization, to evaluate the hardware and the optimum design parameters, the design control system and to determine the best controller setting for the refrigeration and air conditioning systems.

  • PDF

Impossible Differential Cryptanalysis on Lai-Massey Scheme

  • Guo, Rui;Jin, Chenhui
    • ETRI Journal
    • /
    • v.36 no.6
    • /
    • pp.1032-1040
    • /
    • 2014
  • The Lai-Massey scheme, proposed by Vaudenay, is a modified structure in the International Data Encryption Algorithm cipher. A family of block ciphers, named FOX, were built on the Lai-Massey scheme. Impossible differential cryptanalysis is a powerful technique used to recover the secret key of block ciphers. This paper studies the impossible differential cryptanalysis of the Lai-Massey scheme with affine orthomorphism for the first time. Firstly, we prove that there always exist 4-round impossible differentials of a Lai-Massey cipher having a bijective F-function. Such 4-round impossible differentials can be used to help find 4-round impossible differentials of FOX64 and FOX128. Moreover, we give some sufficient conditions to characterize the existence of 5-, 6-, and 7-round impossible differentials of Lai-Massey ciphers having a substitution-permutation (SP) F-function, and we observe that if Lai-Massey ciphers having an SP F-function use the same diffusion layer and orthomorphism as a FOX64, then there are indeed 5- and 6-round impossible differentials. These results indicate that both the diffusion layer and orthomorphism should be chosen carefully so as to make the Lai-Massey cipher secure against impossible differential cryptanalysis.

A BEHAVIOR-PRESERVING TRANSLATION FROM FBD DESIGN TO C IMPLEMENTATION FOR REACTOR PROTECTION SYSTEM SOFTWARE

  • Yoo, Junbeom;Kim, Eui-Sub;Lee, Jang-Soo
    • Nuclear Engineering and Technology
    • /
    • v.45 no.4
    • /
    • pp.489-504
    • /
    • 2013
  • Software safety for nuclear reactor protection systems (RPSs) is the most important requirement for the obtainment of permission for operation and export from government authorities, which is why it should be managed with well-experienced software development processes. The RPS software is typically modeled with function block diagrams (FBDs) in the design phase, and then mechanically translated into C programs in the implementation phase, which is finally compiled into executable machine codes and loaded on RPS hardware - PLC (Programmable Logic Controller). Whereas C Compilers are fully-verified COTS (Commercial Off-The-Shelf) software, translators from FBDs to C programs are provided by PLC vendors. Long-term experience, experiments and simulations have validated their correctness and function safety. This paper proposes a behavior-preserving translation from FBD design to C implementation for RPS software. It includes two sets of translation algorithms and rules as well as a prototype translator. We used an example of RPS software in a Korean nuclear power plant to demonstrate the correctness and effectiveness of the proposed translation.

On the Optimal Key Size of the Even-Mansour Cipher in the Random Function Oracle Model (랜덤 오라클 모델에서의 Even-Mansour Cipher에 대한 키 길이 최적화 방법)

  • Sung, Jae-Chul
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.3
    • /
    • pp.35-42
    • /
    • 2007
  • We describe the problem of reducing the key material in the Even-Mansour cipher without security degradation. Even and Mansour proposed a block cipher based on XORing secret key material just prior to and after applying random oracle permutation P such that $C=k_2\bigoplus P(M\bigoplus k_1)$. Recently, Gentry and Ramzan showed that this scheme in the random permutation oracle can be replaced by the four-round Feistel network construction in the random function oracle and also proved that their scheme is super-pseudorandom. In this paper we reduce the key size from 2n to n, which is the optimal key size of Even-Mansour cipher in the random function oracle model and also give almost the same level of security.

Provable Security of Key Derivation Functions Based on the Block Ciphers (블록암호 기반 키유도함수의 증명가능 안전성)

  • Kang, Ju-Sung;Yi, Ok-Yeon;Youm, Ji-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.3-16
    • /
    • 2010
  • Key derivation functions are used within many cryptographic systems in order to generate various keys from a fixed short key string. In this paper we survey a state-of-the-art in the key derivation functions and wish to examine the soundness of the functions on the view point of provable security. Especially we focus on the key derivation functions using pseudorandom functions which are recommended by NISI recently, and show that the variant of Double-Pipeline Iteration mode using pseudorandom permutations is a pseudorandom function. Block ciphers can be regarded as practical primitives of pseudorandom permutations.

Destination Address Block Location on Machine-printed and Handwritten Korean Mail Piece Images (인쇄 및 필기 한글 우편영상에서의 수취인 주소 영역 추출 방법)

  • 정선화;장승익;임길택;남윤석
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.1
    • /
    • pp.8-19
    • /
    • 2004
  • In this paper, we propose an efficient method for locating destination address block on both of machine-Printed and handwritten Korean mail piece images. The proposed method extracts connected components from the binary mail piece image, generates text lines by merging them, and then groups the text fines into nine clusters. The destination address block is determined by selecting some clusters. Considering the geometric characteristics of address information on Korean mail piece, we split a mail piece image into nine areas with an equal size. The nine clusters are initialized with the center coordinate of each area. A modified Manhattan distance function is used to compute the distance between text lines and clusters. We modified the distance function on which the aspect ratio of mail piece could be reflected. The experiment done with live Korean mail piece images has demonstrated the superiority of the Proposed method. The success rate for 1, 988 testing images was about 93.56%.

A CLINICAL STUDY ON TEMPORALIS MYOFASCIAL FLAP FOR ADULT TEMPOROMANDIBULAR JOINT ANKYLOSIS (측두근 근막 피판을 이용한 성인 악관절 강직증의 외과적 재건에 관한 임상적 연구)

  • Park, Bong-Wook;Kim, Jong-Ryoul;Byun, June-Ho
    • Maxillofacial Plastic and Reconstructive Surgery
    • /
    • v.28 no.2
    • /
    • pp.143-153
    • /
    • 2006
  • Temporomandibular joint(TMJ) ankylosis is characterized by the formation of bony or fibrous mass, which replaces the normal articulation. Ankylotic block formation causes reduction of mandibular mobility, particularly hindering mouth opening, due to a mechanical block of the condylar head in its roto-transfatory motion. Surgery in TMJ ankylosis treatment entails complete ankylotic block removal and subsequent arthroplasty, possibly with autologous tissue between articular surfaces or heterologous material to restore the anatomic structure and normal function. Temporalis myofascial flap holds great promise for the reconstruction of various maxillofacial defects. In more recent years, a pedicled temporalis myofascial flap has been advocated in TMJ ankylosis surgery. Advantages of the temporalis myofascial flap in TMJ reconstruction include close proximity to the TMJ, adequate blood supply from the internal maxillary artery, and its attachment to the coronoid process, which provides movement of the flap during function, simulating physiologic action of the disc. This study evaluated 8 patients(11 TMJs) affected by TMJ ankylosis. All patients underwent surgical treatment of the removal of the ankylotic block and subsequent interpositional arthroplasty with temporalis myofascial flap. Bilateral TMJ ankylosis was observed in 3 patients(6 TMJs), right-sides in 3 patients, left-sided in 2 patients. Epipathogenesis was traumatic in 6 patients(8 TMJs), ankylosing spondylitis in 2 patients(3 TMJs). In 3 patients coronoidotomy was underwent. Average follow-up was 16.8 months after surgery, with a range of 7 to 28 months. No patients underwent additional TMJ procedures after the temporalis myofascial flap. All patients showed a distinctive improvement both in articular functionality and symptoms. We found that temporalis myofascial flap is very valuable in reconstruction of TMJ ankylosis.

A Cryptoprocessor for AES-128/192/256 Rijndael Block Cipher Algorithm (AES-128/192/256 Rijndael 블록암호 알고리듬용 암호 프로세서)

  • 안하기;박광호;신경욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.257-260
    • /
    • 2002
  • This paper describes a design of cryptographic processor that implements the AES (Advanced Encryption Standard) block cipher algorithm“Rijndael”. To achieve high throughput rate, a sub-pipeline stage is inserted into the round transformation block, resulting that the second half of current round function and the first half of next round function are being simultaneously operated. For area-efficient and low-power implementation the round transformation block is designed to share the hardware resources in encryption and decryption. An efficient scheme for on-the-fly key scheduling, which supports the three master-key lengths of 128-b/192-b/256-b, is devised to generate round keys in the first sub-pipeline stage of each round processing. The cryptoprocessor designed in Verilog-HDL was verified using Xilinx FPGA board and test system. The core synthesized using 0.35-${\mu}{\textrm}{m}$ CMOS cell library consists of about 25,000 gates. Simulation results show that it has a throughput of about 520-Mbits/sec with 220-MHz clock frequency at 2.5-V supply.

  • PDF