• Title/Summary/Keyword: Plain Text

Search Result 95, Processing Time 0.023 seconds

Hardware Design with Efficient Pipelining for High-throughput AES (높은 처리량을 가지는 AES를 위한 효율적인 파이프라인을 적용한 하드웨어 설계)

  • Antwi, Alexander O.A;Ryoo, Kwangki
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.578-580
    • /
    • 2017
  • IoT technology poses a lot of security threats. Various algorithms are thus employed in ensuring security of transactions between IoT devices. Advanced Encryption Standard (AES) has gained huge popularity among many other symmetric key algorithms due to its robustness till date. This paper presents a hardware based implementation of the AES algorithm. We present a four-stage pipelined architecture of the encryption and key generation. This method allowed a total plain text size of 512 bits to be encrypted in 46 cycles. The proposed hardware design achieved a maximum frequency of 1.18GHz yielding a throughput of 13Gbps and 800MHz yielding a throughput of 8.9Gbps on the 65nm and 180nm processes respectively.

  • PDF

In based Secure Tunnel Broker for IPv6 (IPv6를 위한 XML 기반 안전한 터널 브로커)

  • Seo Chang-Ho;Yun Bo-Hyun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.6
    • /
    • pp.531-537
    • /
    • 2005
  • The Tunnel Broker is to provide dedicated servers and to automatically manage tunnel requests coming from the users. This approach is useful to stimulate the growth of IPv6 interconnected hosts and to provide easy access to their IPv6 networks. However, the existing tunnel broker is vulnerable to attacks of malicious users about network resources and services. Therefore, to solve the secure problem of tunnel broker, this paper presents secure IPv6 tunnel broker based on TSP(Tunnel Setup Protocol). The clients and the tunnel broker are communicated based on SHTTP(Secure HTTP) and the XML message of plain text is converted to XML signature by encryption and decryption. finally, Clients and tunnel server use the IPsec method to protect the important information.

Production of 3D Mongyudowondo with Reinterpretation of Traditional Paintings (전통회화의 재해석을 통한 3차원 몽유도원도 제작)

  • Kim, Jong-il;Kim, Jong-chan;Cho, Seung-il;Kim, Eung-Kon;Joo, Hae-jeong;Kim, Cheeyong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.116-119
    • /
    • 2009
  • Culture is an element of showing the quality of life as the factor that a human can become a human being. Furthermore, culture plays a role to make something new and a source for a higher value-added business. In 21C, the term of cultural contents to combine art with digital technology was derived. In this paper, we reconstruct a 3D Mongudowondo which is improved a plain appreciation into a 3D experience of traditional picture to make better user's convenience and approach. It is a device of restoration for cultural contents and a graft on virtual reality after reinterpreting 15C pictures and analyzing text and image.

  • PDF

A Survey on Security Schemes based on Conditional Privacy-Preserving in Vehicular Ad Hoc Networks

  • Al-Mekhlafi, Zeyad Ghaleb;Mohammed, Badiea Abdulkarem
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.105-110
    • /
    • 2021
  • Contact between Vehicle-to-vehicle and vehicle-to-infrastructural is becoming increasingly popular in recent years due to their crucial role in the field of intelligent transportation. Vehicular Ad-hoc networks (VANETs) security and privacy are of the highest value since a transparent wireless communication tool allows an intruder to intercept, tamper, reply and erase messages in plain text. The security of a VANET based intelligent transport system may therefore be compromised. There is a strong likelihood. Securing and maintaining message exchange in VANETs is currently the focal point of several security testing teams, as it is reflected in the number of authentication schemes. However, these systems have not fulfilled all aspects of security and privacy criteria. This study is an attempt to provide a detailed history of VANETs and their components; different kinds of attacks and all protection and privacy criteria for VANETs. This paper contributed to the existing literature by systematically analyzes and compares existing authentication and confidentiality systems based on all security needs, the cost of information and communication as well as the level of resistance to different types of attacks. This paper may be used as a guide and reference for any new VANET protection and privacy technologies in the design and development.

The Endpaper Types of Bologna Ragazzi Award Korean Picturebooks (볼로냐 라가치상을 수상한 한국 그림책의 면지 유형)

  • Nam, A Reum;Kim, Sang Lim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.327-332
    • /
    • 2022
  • The purpose of this study was to analyze the type of endpapers in Korean picturebooks that won the Bologna Ragazzi Award. The endpapers were classified by three standards: identities between front endpapers and back endpapers, type of arts, and type of contents. As results, picturebooks with identities between front endpapers and back endpapers were slightly more than ones with unidentities. Most of art types were illustrated, followed by patterned and plain. In addition, the peritextual contents were found to be the most frequently used content type in endpapers. The results showed that the most endpapers of the Korean picturebooks that won the Bologna Ragazzi Award were related to the text contents, which suggests the important roles of endpapers in picturebook activities.

A Fully Distributed Secure Approach using Nondeterministic Encryption for Database Security in Cloud

  • Srinu Banothu;A. Govardhan;Karnam Madhavi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.140-150
    • /
    • 2024
  • Database-as-a-Service is one of the prime services provided by Cloud Computing. It provides data storage and management services to individuals, enterprises and organizations on pay and uses basis. In which any enterprise or organization can outsource its databases to the Cloud Service Provider (CSP) and query the data whenever and wherever required through any devices connected to the internet. The advantage of this service is that enterprises or organizations can reduce the cost of establishing and maintaining infrastructure locally. However, there exist some database security, privacychallenges and query performance issues to access data, to overcome these issues, in our recent research, developed a database security model using a deterministic encryption scheme, which improved query execution performance and database security level.As this model is implemented using a deterministic encryption scheme, it may suffer from chosen plain text attack, to overcome this issue. In this paper, we proposed a new model for cloud database security using nondeterministic encryption, order preserving encryption, homomorphic encryptionand database distribution schemes, andour proposed model supports execution of queries with equality check, range condition and aggregate operations on encrypted cloud database without decryption. This model is more secure with optimal query execution performance.

A Study on the Dizziness of Huangdi's Internal Classic $\ll$黃帝內經$\gg$ ($\ll$소문.영추(素問.靈樞)$\gg$에 나타난 현훈(眩暈)에 대한 연구(硏究))

  • Tark, Myoung-Rim;Kang, Na-Ru;Ko, Woo-Shin;Yoon, Hwa-Jung
    • The Journal of Korean Medicine Ophthalmology and Otolaryngology and Dermatology
    • /
    • v.24 no.1
    • /
    • pp.142-170
    • /
    • 2011
  • Objective : The purpose of this study is to investigate dizziness of Plain Questions $\ll$素問$\gg$ and Miraculous Pivot $\ll$靈樞$\gg$. Methods : We conducted a study on the original text paragraphs of Internal Classic $\ll$內經$\gg$ containing the dizziness and analysis of Yang, Ma, Zhang, Wang etc. We drew a parallel between dizziness from Internal Classic $\ll$內經$\gg$and matching diagnoses from western medicine. Results : The results were as follows. 1. Dizziness in Ok Ki Jin Jiang Ron <玉機眞藏論> and Pyo Bon Byeong Jeon Ron <標本病傳論> had relation to liver and was similar to dizziness caused by tension, hypertension, anemia and cerebrovascular accident etc. in western medicine. 2. Dizziness in Ja Yeol<刺熱>, O Sa<五邪> and Hai Ron<海論> had relation to kidney and was similar to dizziness caused by aging and peripheral vertigo concurrent with tinnitus and difficulty in hearing in western medicine. 3. Dizziness in O Sa<五邪> had relation to heart(pericardium) and was similar to dizziness caused by cardiac output loss and psychogenic dizziness in western medicine. 4. In Internal Classic $\ll$內經$\gg$ the main etiology of dizziness was infirmity(虛), which were Qi(氣) of the upper portion of the body being insufficient(上氣不足), blood depletion(血枯), deficiency of marrow-reservoir(髓海不足) etc. 5. In Dae Hok Ron<大惑論> etiology and pathogenesis of dizziness were mentioned and dizziness was similar to dizziness caused by eye disorder, psychogenic dizziness and central dizziness in western medicine. 6. In Internal Classic $\ll$內經$\gg$ the meridian of acupuncture points which was used much for dizziness was Bladder Meridian. Aqupunture points used in treatment of dizziness were Ch'onju(天柱), Kollyun(崑崙), Taejo, Chok-t'ongkok(足通谷) etc. Conclusion : We found out etiology, pathogenesis, treatments of dizziness in Internal Classic $\ll$內經$\gg$. Further we compared with western medicine to develop better understanding of dizziness.

A Study on the Cun, Guan, Chi (Inch, Bar, Cubit) from the Elementary Course for Medicine{Yi Xue Ru Men) (의학입문(醫學入門)의 촌관척(寸關尺)에 관한 고찰(考察))

  • Lee, Soo-Kyeung;Park, Won-Hwan
    • The Journal of the Society of Korean Medicine Diagnostics
    • /
    • v.9 no.2
    • /
    • pp.10-24
    • /
    • 2005
  • Background and Purpose: Feeling the pulse is based on the pulse condition and alteration to observe the condition of the human body's health and by using a healthy person's pulse as a standard we are able to analyze the patient's pulse to find the attacked channel and collateral, viscera and bowels and understand the pathology such as diseases caused by exogenous evil, disorder of internal organs, and seven modes of emotions. Observing the color and shade of the patient's face, listening carefully to the sound of the patient, and feeling the pulse are methods in accordance with Su Wen 'Plain Questions', 'The Classic on Difficulty' (5th century B.C. Bianque), 'The Classic of Sphymology' (280 A.D. Wang Xi), 'Pulse Formulas' (1189 A.D. Cui Jiayan), and is systematically edited for those who have started studying to easily reach the profound state. Therefore, 'The Elementary Course for Medicine' has been used from ancient times as the textbook for diagnostics. Methods: In this Study, we will inspect commonly used pulse feeling methods, the inch, bar, cubit thesis, the viscera and bowels thesis from The Elementary Course for Medicine and inquire the difference of the text from 'Plain Questions of Huangdi's Internal Classic', 'Treatise on Febrile Diseases', 'Classic on Difficulty'. Results and Conclusion: 1. In 'The Elementary Course for Medicine' the site of the wrist along the pulsation of the radial artery is divided into inch, bar, cubit and has defined the inch, bar, cubit crossways. 2. In 'The Elementary Course of Medicine' the inch, bar, cubit for the left hand and right hand is subjected to each viscera and bowel. By assigning the left hand's inch, bar, cubit to the cardial orb, the hepatic orb, the renal orb, and the right hand's inch, bar, cubit to the pulmonic orb, the splenic orb, the vital gate it has been able to feel the pulse for each viscera and bowel by using the interpromoting and interacting relation of the five evolutive phases.

  • PDF

Improved Side Channel Analysis Using Power Consumption Table (소비 전력 테이블 생성을 통한 부채널 분석의 성능 향상)

  • Ko, Gayeong;Jin, Sunghyun;Kim, Hanbit;Kim, HeeSeok;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.961-970
    • /
    • 2017
  • The differential power analysis calculates the intermediate value related to sensitive information and substitute into the power model to obtain (hypothesized) power consumption. After analyzing the calculated power consumption and measuring power consumption, the secret information value can be obtained. Hamming weight and hamming distance models are most commonly used power consumption model, and the power consumption model is obtained through the modeling technique. If the power consumption model assumed by the actual equipment differs from the power consumption of the actual equipment, the side channel analysis performance is declined. In this paper, we propose a method that records measured power consumption and exploits as power consumption model. The proposed method uses the power consumption at the time when the information (plain text, cipher text, etc.) available in the encryption process. The proposed method does not need template in advance and uses the power consumption measured by the actual equipment, so it accurately reflects the power consumption model of the equipment.. Simulation and experiments show that by using our proposed method, side channel analysis is improved on the existing power modeling method.

A Study on a Real Time Presentation Method for Playing of a Multimedia mail on Internet (인터넷상의 동영상 메일을 재생하기 위한 실시간 연출 기법 연구)

  • Im, Yeong-Hwan;Lee, Seon-Hye
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.4
    • /
    • pp.877-890
    • /
    • 1999
  • In this paper, a multimedia mail including video, sound, graphic data has been proposed as the next generation mail of the text based mail. In order to develop the multimedia mail, the most outstanding problem is the fact that the multimedia data are too huge to send them to the receiving end directly. The fact of big data may cause many problems in both transferring and storing the data of the multimedia mail. Our main idea is to separate between a control program for the multimedia presentation and multimedia data. Since the size of a control program is as small as a plain text mail, it has no problem to send it attached to the internet mail to the receiver directly. Instead, the big multimedia data themselves may remain on the sender's computer or be sent to a designated server so that the data may be transferred to the receiver only when the receiver activates the play of the multimedia mail. In this scheme, our research focus is paced on the buffer management and the thread scheduling for the real time play of the multimedia mail on internet. Another problem is to provide an easy way of editing a multimedia presentation for an ordinary people having no programming knowledge. For the purposed, VIP(Visual Interface Player) has been used and the results or multimedia mail implemented on LAN has been described.

  • PDF