• Title/Summary/Keyword: Master Key

Search Result 222, Processing Time 0.026 seconds

The Related-Key Attack on Grain-v1 (스트림 암호 Grain-v1에 대한 연관키 공격)

  • Lee, Yu-Seop;Jung, Ki-Tae;Sung, Jae-Chul;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.45-52
    • /
    • 2008
  • The slide resynchronization attack on Grain-v1 was proposed in [5]. Given the keystream sequence, this attack can generate the 1-bit shifted keystream sequence generated by Grain-v1. In this paper, extending the attack proposed in [5], we propose the key recovery attack on Grain-v1 using the related-key. Using the weakness of the initialization procedure of Grain-v1, this attack recover the master key with $2^{25.02}$ Ⅳs and $2^{56}$ time complexity. This attack is the first known key recovery attack on Grain-v1.

Research trends to analysis of 『Muyedobotongji』 (『무예도보통지』 연구동향 분석)

  • Kwak, Nak-hyun
    • (The)Study of the Eastern Classic
    • /
    • no.55
    • /
    • pp.193-221
    • /
    • 2014
  • This study aims to analyze trends of advanced research of "Muyedobotongji". The conclusions are as following in these. First, the number of theses related with "Muyedobotongji" is 47 in total including 29 master's theses and 18 doctor's theses. The sports science comprises the largest proportion of study including 23 master's degree and 12 doctor's degree. Besides sports science field, "Muyedobotongji" is analyzed in various study fields such as library and information, engineering, science of art and culture contents. In master's theses, They focused on practical ways of "Muyedobotongji". But "Muyedobotongji" is conducted by perspective of the humanities in doctor's theses. Second, There are 72 theses related with "Muyedobotongji" in scientific journal. Regarding these in detail, there are 35 theses in sports science, 12 theses in Korean history, 7 theses in martial arts, 5 theses in dance studies, 4 these in Korean studies, 2 theses in Chinse studies, 2 theses in art history, 1 these in Japanese literature and 1 thesis in military science. This fact helps us understand "Muyedobotongji" is studied actively in sports science field. Third, the future research directions of "Muyedobotongji" Should be considered in 3 categories. first, it needs to do interdisciplinary fusion research. Through this, it can complement insufficient parts of existing researches. Second, it needs to make standard Key words. The unified Key words are able to use communicating in different field of scientific journals without confusing. Third It needs to build data bases which are applied to martial art areas. It can provide chances for both Korean martial arts and "Muyedobotongji" to be practiced in culture contents.

Application of model reduction technique and structural subsection technique on optimal sensor placement of truss structures

  • Lu, Lingling;Wang, Xi;Liao, Lijuan;Wei, Yanpeng;Huang, Chenguang;Liu, Yanchi
    • Smart Structures and Systems
    • /
    • v.15 no.2
    • /
    • pp.355-373
    • /
    • 2015
  • An optimal sensor placement (OSP) method based on structural subsection technique (SST) and model reduction technique was proposed for modal identification of truss structures, which was conducted using genetic algorithm (GA). The constraints of GA variables were determined by SST in advance. Subsequently, according to model reduction technique, the optimal group of master degrees of freedom and the optimal objective function value were obtained using GA in a case of the given number of sensors. Correspondingly, the optimal number of sensors was determined according to optimal objective function values in cases of the different number of sensors. The proposed method was applied on a scaled jacket offshore platform to get its optimal number of sensors and the corresponding optimal sensor layout. Then modal kinetic energy and modal assurance criterion were adopted to evaluate vibration energy and mode independence property. The experiment was also conducted to verify the effectiveness of the selected optimal sensor layout. The results showed that experimental modes agreed reasonably well with numerical results. Moreover the influence of the proposed method using different optimal algorithms and model reduction technique on optimal results was also compared. The results showed that the influence was very little.

A (k,t,n) verifiable multi-secret sharing scheme based on adversary structure

  • Li, Jing;Wang, Licheng;Yan, Jianhua;Niu, Xinxin;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4552-4567
    • /
    • 2014
  • A (n,t,n) secret sharing scheme is to share a secret among n group members, where each member also plays a role of a dealer,and any t shares can be used to recover the secret. In this paper, we propose a strong (k,t,n) verifiable multi-secret sharing scheme, where any k out of n participants operate as dealers. The scheme realizes both threshold structure and adversary structure simultaneously, and removes a trusted third party. The secret reconstruction phase is performed using an additive homomorphism for decreasing the storage cost. Meanwhile, the scheme achieves the pre-verification property in the sense that any participant doesn't need to reveal any information about real master shares in the verification phase. We compare our proposal with the previous (n,t,n) secret sharing schemes from the perspectives of what kinds of access structures they achieve, what kinds of functionalities they support and whether heavy storage cost for secret share is required. Then it shows that our scheme takes the following advantages: (a) realizing the adversary structure, (b) allowing any k out of n participants to operate as dealers, (c) small sized secret share. Moreover, our proposed scheme is a favorable candidate to be used in many applications, such as secure multi-party computation and privacy preserving data mining, etc.

An Efficient Hardware Implementation of Lightweight Block Cipher Algorithm CLEFIA for IoT Security Applications (IoT 보안 응용을 위한 경량 블록 암호 CLEFIA의 효율적인 하드웨어 구현)

  • Bae, Gi-chur;Shin, Kyung-wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.2
    • /
    • pp.351-358
    • /
    • 2016
  • This paper describes an efficient hardware implementation of lightweight block cipher algorithm CLEFIA. The CLEFIA crypto-processor supports for three master key lengths of 128/192/256-bit, and it is based on the modified generalized Feistel network (GFN). To minimize hardware complexity, a unified processing unit with 8 bits data-path is designed for implementing GFN that computes intermediate keys to be used in round key scheduling, as well as carries out round transformation. The GFN block in our design is reconfigured not only for performing 4-branch GFN used for round transformation and intermediate round key generation of 128-bit, but also for performing 8-branch GFN used for intermediate round key generation of 256-bit. The CLEFIA crypto-processor designed in Verilog HDL was verified by using Virtex5 XC5VSX50T FPGA device. The estimated throughput is 81.5 ~ 60 Mbps with 112 MHz clock frequency.

Experimental research on the effect of water-rock interaction in filling media of fault structure

  • Faxu, Dong;Zhang, Peng;Sun, Wenbin;Zhou, Shaoliang;Kong, Lingjun
    • Geomechanics and Engineering
    • /
    • v.24 no.5
    • /
    • pp.471-478
    • /
    • 2021
  • Water damage is one of the five disasters that affect the safety of coal mine production. The erosion of rocks by water is a very important link in the process of water inrush induced by fault activation. Through the observation and experiment of fault filling samples, according to the existing rock classification standards, fault sediments are divided into breccia, dynamic metamorphic schist and mudstone. Similar materials are developed with the characteristics of particle size distribution, cementation strength and water rationality, and then relevant tests and analyses are carried out. The experimental results show that the water-rock interaction mainly reduces the compressive strength, mechanical strength, cohesion and friction Angle of similar materials, and cracks or deformations are easy to occur under uniaxial load, which may be an important process of water inrush induced by fault activation. Mechanical experiment of similar material specimen can not only save time and cost of large scale experiment, but also master the direction and method of the experiment. The research provides a new idea for the failure process of rock structure in fault activation water inrush.

Three-dimensional analysis of the outcome of different scanning strategies in virtual interocclusal registration

  • Jiansong, Mei;Liya, Ma;Jiarui, Chao;Fei, Liu;Jiefei, Shen
    • The Journal of Advanced Prosthodontics
    • /
    • v.14 no.6
    • /
    • pp.369-378
    • /
    • 2022
  • PURPOSE. The purpose of this in vitro study was to assess whether scanning strategies of virtual interocclusal record (VIR) affect the accuracy of VIR during intraoral scanning. MATERIALS AND METHODS. Five pairs of reference cubes were added to the digital upper and lower dentitions of a volunteer, which were printed into resin casts. Subsequently, the resin casts were articulated in the maximal intercuspal position in a mechanical articulator and scanned with an industrial computed tomography system, of which the VIR was served as a reference VIR. The investigated VIR of the upper and lower jaws of the resin master cast were recorded with an intraoral scanner according to 9 designed scanning strategies. Then, the deviation between the investigated VIRs and reference VIR were analyzed, which were measured by the deviation of the distances of six selected reference points on the upper reference cubes in each digital cast to the XY-plane between the investigated VIRs and reference VIR. RESULTS. For the deviation in the right posterior dentitions, RP group (only scanning of right posterior dentitions) showed the smallest deviation. Besides, BP group (scanning of bilateral posterior dentitions) showed the smallest deviation in the left posterior dentitions. Moreover, LP group (scanning of left posterior dentitions) showed the smallest deviation in the anterior dentitions. For the deviation of full dental arches, BP group showed the smallest deviation. CONCLUSION. Different scanning strategies of VIR can influence the accuracy of alignment of virtual dental casts. Appropriate scanning strategies of VIR should be selected for different regions of interest and edentulous situations.

A Hardware Design of Ultra-Lightweight Block Cipher Algorithm PRESENT for IoT Applications (IoT 응용을 위한 초경량 블록 암호 알고리듬 PRESENT의 하드웨어 설계)

  • Cho, Wook-Lae;Kim, Ki-Bbeum;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.7
    • /
    • pp.1296-1302
    • /
    • 2016
  • A hardware implementation of ultra-lightweight block cipher algorithm PRESENT that was specified as a block cipher standard for lightweight cryptography ISO/IEC 29192-2 is described in this paper. Two types of crypto-core that support master key size of 80-bit are designed, one is for encryption-only function, and the other is for encryption and decryption functions. The designed PR80 crypto-cores implement the basic cipher mode of operation ECB (electronic code book), and it can process consecutive blocks of plaintext/ciphertext without reloading master key. The PR80 crypto-cores were designed in soft IP with Verilog HDL, and they were verified using Virtex5 FPGA device. The synthesis results using $0.18{\mu}m$ CMOS cell library show that the encryption-only core has 2,990 GE and the encryption/decryption core has 3,687 GE, so they are very suitable for IoT security applications requiring small gate count. The estimated maximum clock frequency is 500 MHz for the encryption-only core and 444 MHz for the encryption/decryption core.

Statistics and probability analysis of vehicle overloads on a rigid frame bridge from long-term monitored strains

  • Li, Yinghua;Tang, Liqun;Liu, Zejia;Liu, Yiping
    • Smart Structures and Systems
    • /
    • v.9 no.3
    • /
    • pp.287-301
    • /
    • 2012
  • It is well known that overloaded vehicles may cause severe damages to bridges, and how to estimate and evaluate the status of the overloaded vehicles passing through bridges become a challenging problem. Therefore, based on the monitored strain data from a structural health monitoring system (SHM) installed on a bridge, a method is recommended to identify and analyze the probability of overloaded vehicles. Overloaded vehicle loads can cause abnormity in the monitored strains, though the abnormal strains may be small in a concrete continuous rigid frame bridge. Firstly, the abnormal strains are identified from the abundant strains in time sequence by taking the advantage of wavelet transform in abnormal signal identification; secondly, the abnormal strains induced by heavy vehicles are picked up by the comparison between the identified abnormal strains and the strain threshold gotten by finite element analysis of the normal heavy vehicle; finally, according to the determined abnormal strains induced by overloaded vehicles, the statistics of the overloaded vehicles passing through the bridge are summarized and the whole probability of the overloaded vehicles is analyzed. The research shows the feasibility of using the monitored strains from a long-term SHM to identify the information of overloaded vehicles passing through a bridge, which can help the traffic department to master the heavy truck information and do the damage analysis of bridges further.

Design and Implementation of a Universal System Control Strategy Applicable to VSC-HVDC Systems

  • Zhao, Yue;Shi, Li-bao;Ni, Yi-xin;Xu, Zheng;Yao, Liang-zhong
    • Journal of Power Electronics
    • /
    • v.18 no.1
    • /
    • pp.225-233
    • /
    • 2018
  • This paper proposes a universal system control strategy for voltage source converter (VSC) based high voltage direct current (HVDC) systems. The framework of the designed control strategy consists of five layer structures considering the topology and control characteristics of the VSC-HVDC system. The control commands sent from the topmost layer can be transmitted to the next layer based on the existing communication system. When the commands are sent to each substation, the following transmission of commands between the four lower layers are realized using the internal communication system while ignoring the communication delay. This hierarchical control strategy can be easily applied to any VSC-HVDC system with any topology. Furthermore, an integrated controller for each converter is designed and implemented considering all of the possible operating states. The modular-designed integrated controller makes it quite easy to extend its operating states if necessary, and it is available for any kind of VSC. A detailed model of a VSC-HVDC system containing a DC hub is built in the PSCAD/EMTDC environment. Simulation results based on three operating conditions (the start-up process, the voltage margin control method and the master-slave control method) demonstrate the flexibility and validity of the proposed control strategy.