• Title/Summary/Keyword: Initialization vector

Search Result 30, Processing Time 0.025 seconds

IV safe transfer algorithm adding hashing (해슁을 추가한 안전한 IV 전송 알고리즘)

  • Lee, Young-Ji;Kim, Tai-Yun;Hyeon, Eun-Sil;Park, Nam-Seop
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04b
    • /
    • pp.651-654
    • /
    • 2001
  • IPSec(IP Security)은 데이터가 공개적으로 전송되는 네트워크에서 데이터에 암호화와 인증, 무결성을 제공하기 위해 사용되는 프로토콜이다. IPSec 안에는 여러 프로토콜이 있는데, 그 중에 실제 패킷에 암호화와 인증, 무결성을 추가해 전달하기 위해서는 ESP(Encapsulation Security Payload)라는 프로토콜이 사용된다. 이 ESP는 패킷을 암호화하기 위해 DES-CBC 모드를 사용하는데, 여기에서 IV(Initialization Vector) 값이 쓰인다. 이 값은 패킷 복호화를 하기 위해 공개적으로 전달이 되기 때문에 중간에 공격자에 의해 공격 당할 위험이 많다. 본 논문에서는 IV 공격을 방지하기 위해 IV 의 값을 해쉬 함수를 통해 한번 해슁을 한 다음에, IV 값을 안전하게 전달하는 방법을 제시하고자 한다.

  • PDF

Invited Speech at ICSS 2007 Generation of Session, Authentication, and Encryption Keys for CDMA2000 1x EV-DO Air Interface Standard

  • Rhee, Man-Young
    • Review of KIISC
    • /
    • v.17 no.2
    • /
    • pp.9-23
    • /
    • 2007
  • The air interface supports a security layer which provides the key exchange protocol, authentication protocol, and encryption protocol. The authentication is performed on the encryption protocol packet. The authentication protocol header or trailer may contain the digital signature that is used to authenticate a portion of the authentication protocol packet that is authenticated. The encryption protocol may add a trailer to hide the actual length of the plaintext of padding to be used by the encryption algorithm. The encryption protocol header may contain variables such as the initialization vector (IV) to be used by the encryption protocol. It is our aim to firstly compute the session key created from the D H key exchange algorithm, and thereof the authenticating key and the encryption key being generated from the session key.

A Massively Parallel Algorithm for Fuzzy Vector Quantization (퍼지 벡터 양자화를 위한 대규모 병렬 알고리즘)

  • Huynh, Luong Van;Kim, Cheol-Hong;Kim, Jong-Myon
    • The KIPS Transactions:PartA
    • /
    • v.16A no.6
    • /
    • pp.411-418
    • /
    • 2009
  • Vector quantization algorithm based on fuzzy clustering has been widely used in the field of data compression since the use of fuzzy clustering analysis in the early stages of a vector quantization process can make this process less sensitive to its initialization. However, the process of fuzzy clustering is computationally very intensive because of its complex framework for the quantitative formulation of the uncertainty involved in the training vector space. To overcome the computational burden of the process, this paper introduces an array architecture for the implementation of fuzzy vector quantization (FVQ). The arrayarchitecture, which consists of 4,096 processing elements (PEs), provides a computationally efficient solution by employing an effective vector assignment strategy during the clustering process. Experimental results indicatethat the proposed parallel implementation providessignificantly greater performance and efficiency than appropriately scaled alternative array systems. In addition, the proposed parallel implementation provides 1000x greater performance and 100x higher energy efficiency than other implementations using today's ARMand TI DSP processors in the same 130nm technology. These results demonstrate that the proposed parallel implementation shows the potential for improved performance and energy efficiency.

Sequential Speaker Classification Using Quantized Generic Speaker Models (양자화 된 범용 화자모델을 이용한 연속적 화자분류)

  • Kwon, Soon-Il
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.1
    • /
    • pp.26-32
    • /
    • 2007
  • In sequential speaker classification, the lack of prior information about the speakers poses a challenge for model initialization. To address the challenge, a predetermined generic model set, called Sample Speaker Models, was previously proposed. This approach can be useful for accurate speaker modeling without requiring initial speaker data. However, an optimal method for sampling the models from a generic model pool is still required. To solve this problem, the Speaker Quantization method, motivated by vector quantization, is proposed. Experimental results showed that the new approach outperformed the random sampling approach with 25% relative improvement in error rate on switchboard telephone conversations.

Automatic Bone Segmentation from CT Images Using Chan-Vese Multiphase Active Contour

  • Truc, P.T.H.;Kim, T.S.;Kim, Y.H.;Ahn, Y.B.;Lee, Y.K.;Lee, S.Y.
    • Journal of Biomedical Engineering Research
    • /
    • v.28 no.6
    • /
    • pp.713-720
    • /
    • 2007
  • In image-guided surgery, automatic bone segmentation of Computed Tomography (CT) images is an important but challenging step. Previous attempts include intensity-, edge-, region-, and deformable curve-based approaches [1], but none claims fully satisfactory performance. Although active contour (AC) techniques possess many excellent characteristics, their applications in CT image segmentation have not worthily exploited yet. In this study, we have evaluated the automaticity and performance of the model of Chan-Vese Multiphase AC Without Edges towards knee bone segmentation from CT images. This model is suitable because it is initialization-insensitive and topology-adaptive. Its segmentation results have been qualitatively compared with those from four other widely used AC models: namely Gradient Vector Flow (GVF) AC, Geometric AC, Geodesic AC, and GVF Fast Geometric AC. To quantitatively evaluate its performance, the results from a commercial software and a medical expert have been used. The evaluation results show that the Chan-Vese model provides superior performance with least user interaction, proving its suitability for automatic bone segmentation from CT images.

A proposal of binary sequence generator, Threshold Clock-Controlled LM-128 (클럭 조절 방식의 임계 클럭 조절형 LM-128 이진 수열 발생기 제안)

  • Jo, Jung-bok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1104-1109
    • /
    • 2015
  • Due to the rapid growth in digital contents, it is important for us to design a high speed and secure encryption algorithm which is able to comply with the existing and future needs. This paper proposes an alternative approach for self-decimated LM-128 summation sequence generator, which will generate a higher throughput if compared to the conventional generator. We design and implement a threshold clock-controlled LM-128 and prove that it has a lower clock cycle and hence giving a higher key stream generation speed. The proposed threshold clock-control LM-128 generator consists of 256 bits inner state with 128 bits secret key and initialization vector. The cipher achieves a security level of 128 bits to be adapted to the digital contents security with high definition and high quality.

Human Iris Recognition System using Wavelet Transform and LVQ (웨이브렛 변환과 LVQ를 이용한 홍채인식 시스템)

  • Lee, Gwan-Yong;Im, Sin-Yeong;Jo, Seong-Won
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.49 no.7
    • /
    • pp.389-398
    • /
    • 2000
  • The popular methods to check the identity of individuals include passwords and ID cards. These conventional method for user identification and authentication are not altogether reliable because they can be stolen and forgotten. As an alternative of the existing methods, biometric technology has been paid much attention for the last few decades. In this paper, we propose an efficient system for recognizing the identity of a living person by analyzing iris patterns which have a high level of stability and distinctiveness than other biometric measurements. The proposed system is based on wavelet transform and a competitive neural network with the improved mechanisms. After preprocessing the iris data acquired through a CCD camera, feature vectors are extracted by using Haar wavelet transform. LVQ(Learning Vector Quantization) is exploited to classify these feature vectors. We improve the overall performance of the proposed system by optimizing the size of feature vectors and by introducing an efficient initialization of the weight vectors and a new method for determining the winner in order to increase the recognition accuracy of LVQ. From the experiments, we confirmed that the proposed system has a great potential of being applied to real applications in an efficient and effective way.

  • PDF

An Automatic Extraction of Blood Flow Contour from Cardiac MRI (심장 MRI 영상에서 혈류 윤곽선의 자동 추출)

  • Lee, Hyeong-Jik;Jo, Sang-Hyeon;Choe, Heung-Mun
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.37 no.5
    • /
    • pp.56-62
    • /
    • 2000
  • In this paper, an automatic extraction of the blood flow contour from cardiac MRI is proposed. By using the GVF snake which has wider capture range than the conventional snake, and by automatically generating the initial points along the outside of the contour of the zero GVF field in the edge image of the cardiac MRI, the blood flow contour can be automatically extracted, even when the contours have boundary concavities due to the papillary muscles, without any manual initialization of the experts. Experiments are conducted on the various real cardiac MRIs including noise and papillary muscles, and the proposed method is proved to be efficient in automatic extraction of the blood contours even if they have the boundary concavities.

  • PDF

Generic Scheduling Method for Distributed Parallel Systems (분산병렬 시스템에서 유전자 알고리즘을 이용한 스케쥴링 방법)

  • Kim, Hwa-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.1B
    • /
    • pp.27-32
    • /
    • 2003
  • This paper presents the Genetic Algorithm based Task Scheduling (GATS) method for the scheduling of programs with diverse embedded parallelism types in Distributed Parallel Systems, which consist of a set of loosely coupled parallel and vector machines connected via high speed networks The distributed parallel processing tries to solve computationally intensive problems that have several types of parallelism, on a suite of high performance and parallel machines in a manner that best utilizes the capabilities of each machine. When scheduling in distributed parallel systems, the matching of the parallelism characteristics between tasks and parallel machines rather than load balancing should be carefully handled with the minimization of communication cost in order to obtain more speedup. This paper proposes the based initialization methods for an initial population and the knowledge-based mutation methods to accommodate the parallelism type matching in genetic algorithms.

Retrieval of satellite cloud drift winds with GMS-5 and inter comparison with radiosonde data over the Korea

  • Suh, Ae-Sook;Lee, Yong-Seob;Ryu, Seung-Ah
    • Proceedings of the KSRS Conference
    • /
    • 2000.04a
    • /
    • pp.49-54
    • /
    • 2000
  • Conventional methods for measuring winds provide wind velocity observations over limited area and time period. The use of satellite imagery for measuring wind velocity overcomes some of these limitations by providing wide area and near condinuous coverage. And its accurate depiction is essential for operational weather forecasting and for initialization of NWP models. GMS-5 provides full disk images at hourly intervals. At four times each day - 0500, 1100, 1700, 2300 hours UTC-a series of three images is received, separated by thirty minutes, centered at the four times. The current wind system generates winds from sets of 3 infrared(IR) images, separated by an hour, four times a day. It also produces visible(VIS) and water vapor(WV) image-based winds from half-hourly imagery four times a day. The derivation of wind from satellite imagery involves the identification of suitable cloud targets. tracking the targets on sequential images, associating a pressure height with the derived wind vector, and quality control. The aim of this research is to incorporate imagery from other available spectral channels and examine the error characteristics of winds derived from these images.

  • PDF