• Title/Summary/Keyword: Padding Algorithm

Search Result 22, Processing Time 0.01 seconds

Design of a Padding Algorithm Using the Pad Character Length (패딩 문자열 길이 정보를 이용한 패딩 알고리즘 설계)

  • Jang, Seung-Ju
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.10
    • /
    • pp.1371-1379
    • /
    • 2006
  • This paper suggests the padding algorithm using padding character length to concatenate more than one string without side-effect. Most existing padding algorithms padding null character in the empty location could not discriminate the real string from the padded character. To overcome this problem, in this paper, the padded character contains pad character length information. This mechanism is working better than NULL or '00' padding cases. The suggested padding algorithm could be effective for data encryption and decryption algorithms.

  • PDF

3-Tire File Encryption algorithm using GSF (GSF(GrayScale File) 출력을 이용한 3-Tire 파일 암호화 알고리즘)

  • Kim Young-Shil;Kim Young-Mi;Kim Ryun-Ok;Baik Doo-Kwon
    • The Journal of Information Technology
    • /
    • v.5 no.4
    • /
    • pp.115-127
    • /
    • 2002
  • This paper proposes improved file encryption algorithm which represents image of grayscale type not using proper cover image for ciphertext. This method consists of 3-Tire encryption steps. 1-Tire and 2-Tire encrypt the information using existed stream algorithm and block algorithm with modyfied padding method. We propose the MBE method as 3-Tire, which hides structure and format of encrypted file. The proposed method outputs grayscale file as the result of encryption and since many GSF outputs resulted from different kinds plaintexts, have similar patterns. we obtain both file encryption and hiding the file information. Also, to solve the problem of padding in block algorithm, we propose the new padding algorithm called SELI(Select Insert) and apply 2-Tire block algorithm and MBE algorithm used 3-Tire.

  • PDF

Analysis of Padding Oracle Attack Possibility about Application Environment; SRTP, MIKEY, CMS, IPSec, TLS, IPTV (SRTP, MIKEY, CMS, IPSec, TLS, IPTV에 대한 패딩 오라클 공격 가능성 분석)

  • Hwang, Seongjin;Park, Myungseo;Moon, Dukjae;Kang, HyungChul;Kim, Jongsung;Lee, Changhoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.2
    • /
    • pp.73-80
    • /
    • 2015
  • In the various application environments on the internet, we use verified cipher algorithm to protect personal information. Even so, if an application method isn't proper, the information you want to keep can be intercepted. One of the representative examples of it is a PADDING ORACLE ATTACK. This thesis studied about STRP, MIKEY, CMS, IPSec, TLS, IPTV, an application environment which apply CBC operational mode based on block cipher and CBC padding method, and about whether we can attack against the Padding Oracle Attack as well as the vulnerable points.

Additional Data Transmission Method using DTV Essential Padding Area (DTV 필수 패딩 영역을 이용한 부가 데이터 전송방법)

  • Lee, Bub ki;Han, Chan Ho
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.11
    • /
    • pp.1237-1243
    • /
    • 2018
  • In the HDTV video codec, conventional the padding method of DEPA(DTV essential padding area) region is aimed at minimizing the redundant information to be transmitted. This article propose a method to transmit additional data by using DEPA region. The proposed method is effective for the channel and storage because it can reduce the amount of bits while preventing deterioration of image quality by inserting binary gray image blocks into the DEPA region. Additionally this algorithm can be used in various fields because it conforms to the standards of MPEG-2, ATSC, and DVB encoders.

Padding Oracle Attack on Block Cipher with CBC|CBC-Double Mode of Operation using the BOZ-PAD (BOZ-PAD 방법을 사용하는 블록암호 기반 CBC|CBC 이중 모드에 대한 패딩 오라클 공격)

  • Hwang, Seongjin;Lee, Changhoon
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.1
    • /
    • pp.89-97
    • /
    • 2015
  • In the various application environments on the internet, we use verified cipher algorithm to protect personal information of electronic commerce or application environments. Even so, if an application method isn't proper, the information you want to keep can be intercepted. This thesis studied about result of Padding Oracle Attack, an application environment which apply CBC|CBC operational mode based on block cipher and BOZ padding method.

High Resolution Cyclostationary Spectrum Sensing for ATSC Signal Detection (ATSC 신호 검출을 위한 고분해능 사이클로스테이션너리(Cyclostationary) 스펙트럼 센싱)

  • Yoo, Do-Sik;Lim, Jong-Tae;Kang, Min-Hong;Lim, Sun-Min
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.3
    • /
    • pp.378-384
    • /
    • 2009
  • In this paper, we consider a cyclostationary-feature-detection based spectrum sensing algorithm for ATSC signal detection. One of the proposed algorithms for IEEE 802.22 standardization organization which meet the requirements of IEEE 802.22 is Thomson's algorithm based on cyclostationary feature detection. We propose an interpolation-based spectrum sensing algorithm for ATSC signal detection, which has less computation complexity than that of Thomson's algorithm and provides no performance loss compared to Thomson's algorithm. By using zero-padding in time domain and effective sensing scanning method, the proposed algorithm requires less computational complexity and shows no performance degradation compared to Thomson's algorithm.

  • PDF

Efficient Image Upsampling using Frequency Resolution Expansion Schemes in DCT Domain (DCT 도메인에서의 주파수 해상도 화장 기법을 이용한 효과적인 이미지 업샘플링)

  • Park Seung-Wook;Park Ji-Ho;Jeon Byeong-Moon;Park Hyun Wook
    • Journal of Broadcast Engineering
    • /
    • v.10 no.4 s.29
    • /
    • pp.505-514
    • /
    • 2005
  • Image upsampling can be performed in both spatial and frequency (transform) domain. In the spatial domain, various upsampling techniques are developed and 6-tap FIR interpolation filter is most well known method, which is embedded in many video coding standards. It can provide high subjective quality but shows low objective quality. In the transform domain, simple zero padding method can produce upsampled image easily. It shows better objective quality than 6-tap filtering, but it yields ringing effects which annoy eyes. In this paper, we present efficient upsampling method using frequency addition method in transform domain to provide better subjective and objective quality than conventional method Extensive simulation results show that the proposed algorithm produces visually fine images with high PSNR.

A Study on Application of Shortened TPC Algorithm for DVB-RCS NG Systems (DVB-RCS NG시스템에서 Shortened TPC 알고리즘 적용 방안에 관한 연구)

  • Lim, Byeong-Su;Kim, Min-Hyuk;Park, Tae-Doo;Jung, Ji-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.11C
    • /
    • pp.712-719
    • /
    • 2011
  • In this paper, we analyzed the performance of soft decision e-BCH codes which presented in DVB-RCS NG system. However, the performance of soft-decision decoding for e-BCH is not much improved as to increase the iterations. Therefore this paper proposed rate-compatible TPC which makes various coding rates by zero padding the row and/or column to adapt next generation (NG) DVB-RCS system. And so we proposed new model of extended BCH code and researches how to develop performance of extended BCH code.

A Study on the Image Watermarking Method (이미지 워터마킹 기법에 관한 연구)

  • Lee, Doo Sung;Kim, Sun Hyung;Kim, Ki Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.161-168
    • /
    • 2009
  • There are many research for efficient, robust and invisible watermarking system that protects the digital contents like a image and animation according to growth of IT industry. First of all, frequency domain watermarking system like DWT(Descrete Wavelet Transform) is excellent because of minimum loss of original image and robustness of external attack. But, if we raise the insertion strength of watermark, then blazing of image occurs on existing DWT watermarking system and we should have a regular square image. In this study, we research the overflow check for preventing image from blazing and a robust and invisible watermarking algorithm. And we research a free-size DWT watermarking system using padding bytes, without a dependency of size.

Invited Speech at ICSS 2007 Generation of Session, Authentication, and Encryption Keys for CDMA2000 1x EV-DO Air Interface Standard

  • Rhee, Man-Young
    • Review of KIISC
    • /
    • v.17 no.2
    • /
    • pp.9-23
    • /
    • 2007
  • The air interface supports a security layer which provides the key exchange protocol, authentication protocol, and encryption protocol. The authentication is performed on the encryption protocol packet. The authentication protocol header or trailer may contain the digital signature that is used to authenticate a portion of the authentication protocol packet that is authenticated. The encryption protocol may add a trailer to hide the actual length of the plaintext of padding to be used by the encryption algorithm. The encryption protocol header may contain variables such as the initialization vector (IV) to be used by the encryption protocol. It is our aim to firstly compute the session key created from the D H key exchange algorithm, and thereof the authenticating key and the encryption key being generated from the session key.