• Title/Summary/Keyword: Quantum Algorithm

Search Result 148, Processing Time 0.025 seconds

Fairness Queuing Algorithm Supporting TCP Packet (TCP 패킷을 지원하는 공정 큐잉 알고리즘)

  • Youn, Yeo-Hoon;Kim, Tai-Yun
    • Annual Conference of KIPS
    • /
    • 2001.04a
    • /
    • pp.531-534
    • /
    • 2001
  • 라우터나 스위치 같은 네트워크상의 접근 포인트에서 트래픽들에 대한 불공정 큐잉은 서비스의 성능을 저하시킬 뿐만 아니라 불필요한 병목을 일으킬 우려가 많기 때문에 트래픽들에 대한 공정한 패킷 스케줄링 기법들이 많이 연구되고 있다[2]. 그 중에서 서비스 할당량 SQ(Service Quantum)와 결손 계측자 DC(Deficit Counter)를 사용하는 DRR 기법은 다른 것들에 비해 작업 복잡도가 낮고 보다 정확한 공정성을 보장하는 패킷 스케줄링 기법이다. 그러나 이 기법은 TCP 프로토콜의 재전송 타이머에 의해 검출된 전송이 실패된 패킷을 고려하지 않고 있다. 본 논문에서는 TCP 프로토콜의 재전송 타이머에 의해 검출된 전송이 실패된 TCP 패킷을 관리하기 위한 추가적인 큐를 두어 기존의 DRR 보다 정확한 공정성을 보장하는 기법을 제안한다.

  • PDF

An Analysis of Magnetocardiogram Data using Neural Network (심자도 데이터의 신경망 분석)

  • Eum, Sang-hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.281-282
    • /
    • 2016
  • The electrical current generated by heart creates not only electric potential but also a magnetic field. In this study, the signals obtained magnetocardiogram (MCG) using 61 channel superconducting quantum interference device(SQUID) system the clinical significance of various parameters has been developed MCG. Neural network algorithm was used to perform the analysis of heart disease.

  • PDF

Hybrid Resource Allocation Scheme in Secure Intelligent Reflecting Surface-Assisted IoT

  • Su, Yumeng;Gao, Hongyuan;Zhang, Shibo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3256-3274
    • /
    • 2022
  • With the rapid development of information and communications technology, the construction of efficient, reliable, and safe Internet of Things (IoT) is an inevitable trend in order to meet high-quality demands for the forthcoming 6G communications. In this paper, we study a secure intelligent reflecting surface (IRS)-assisted IoT system where malicious eavesdropper trying to sniff out the desired information from the transmission links between the IRS and legitimate IoT devices. We discuss the system overall performance and propose a hybrid resource allocation scheme for maximizing the secrecy capacity and secrecy energy efficiency. In order to achieve the trade-off between transmission reliability, communication security, and energy efficiency, we develop a quantum-inspired marine predator algorithm (QMPA) for realizing rational configuration of system resources and prevent from eavesdropping. Simulation results demonstrate the superiority of the QMPA over other strategies. It is also indicated that proper IRS deployment and power allocation are beneficial for the enhancement of system overall capacity.

Identity-Based Key Management Scheme for Smart Grid over Lattice

  • Wangke, Yu;Shuhua, Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.74-96
    • /
    • 2023
  • At present, the smart grid has become one of the indispensable infrastructures in people's lives. As a commonly used communication method, wireless communication is gradually, being widely used in smart grid systems due to its convenient deployment and wide range of serious challenges to security. For the insecurity of the schemes based on large integer factorization and discrete logarithm problem in the quantum environment, an identity-based key management scheme for smart grid over lattice is proposed. To assure the communication security, through constructing intra-cluster and inter-cluster multi-hop routing secure mechanism. The time parameter and identity information are introduced in the relying phase. Through using the symmetric cryptography algorithm to encrypt improve communication efficiency. Through output the authentication information with probability, the protocol makes the private key of the certification body no relation with the distribution of authentication information. Theoretic studies and figures show that the efficiency of keys can be authenticated, so the number of attacks, including masquerade, reply and message manipulation attacks can be resisted. The new scheme can not only increase the security, but also decrease the communication energy consumption.

Optimization for LEA Quantum Circuit for Applying Grover's Algorithm (그루버 알고리즘 적용을 위한 LEA 양자 회로 최적화)

  • Jang, Kyung-Bae;Kim, Hyun-Jun;Park, Jae-Hoon;Seo, Hwa-Jeong
    • Annual Conference of KIPS
    • /
    • 2020.11a
    • /
    • pp.405-408
    • /
    • 2020
  • 양자 컴퓨터를 활용한 양자 알고리즘은 우리가 현재 사용하고 있는 많은 암호들의 안전성을 깨뜨릴 수 있다. 그루버 알고리즘을 n-bit 보안레벨을 가지는 대칭키 암호에 적용한다면 보안레벨을 O(2n/2)까지 낮출 수 있다. 그루버 알고리즘을 적용하기 위해서는 우선 대상 암호가 양자 회로로 구현되어야 한다. 때문에 대상 블록암호를 양자 회로로 최적화하는 연구들이 최근 활발히 진행되고 있다. 이에 본 논문에서는 국산 경량 블록암호 LEA를 양자 회로에서 최적화 하였다. 기존의 LEA 양자 회로구현과 비교하여 양자 게이트는 더 많이 사용하였지만, 큐빗을 획기적으로 줄일 수 있었으며 이에 대한 성능 평가를 수행하였다. 마지막으로 제안하는 LEA 구현에 그루버 알고리즘을 적용하기 위한 양자 자원을 평가하였다.

A Study on Efficient Hardware Design of Digital Signature Algorithm for Post-Quantum Cryptography SPHINCS+ (PQC SPHINCS+ 전자 서명 알고리즘의 효과적인 하드웨어 설계에 관한 연구)

  • Yongseok Lee;Cansu Karakuzu;Yunheung Paek
    • Annual Conference of KIPS
    • /
    • 2023.05a
    • /
    • pp.239-241
    • /
    • 2023
  • 본 논문은 통신 시스템에 주로 사용되는 디지털 전자 서명 알고리즘 중 양자 내성 암호인 SPHINCS+ 알고리즘에 대한 효과적인 하드웨어 설계 방안에 대한 연구이다. SPHINCS+ 알고리즘은 해시 함수 기반 알고리즘으로, 많은 횟수의 해시 함수가 반복해서 사용된다. 해시 함수를 가속 연산해도, 그 횟수가 크기 때문에 SPHINCS+ 알고리즘은 다른 전자 서명 알고리즘보다 하드웨어 설계 후 큰 latency 를 가지는 특징이 있다. 이를 극복하기 위해 SPHINCS+ 알고리즘에서 사용되는 해시 함수들을 면밀하게 분석한다. 그 결과 같은 해시 함수에 대해서도 입출력 데이터 크기가 다양하게 변화하고, 서로 다른 데이터 플로우를 가지는 그 세부 차이점들을 파악하여, 이를 접목한 하드웨어 설계에 대해 논의한다.

PQ-PoRR: Post-Quantum Blockchain Consensus Algorithm with Round-Robin (PQ-PoRR: 라운드로빈 기반 양자 내성 블록체인 합의 알고리즘)

  • Won-Woong Kim;Yea-Jun Kang;Hyun-Ji Kim;Yu-Jin Oh;Hwa-Jeong Seo
    • Annual Conference of KIPS
    • /
    • 2023.11a
    • /
    • pp.257-259
    • /
    • 2023
  • 양자 컴퓨터의 발전과 쇼어 알고리즘을 통한 ECC(Eliptic Curve Cryptography)에 대한 다항 시간의 솔루션을 제공함으로써 블록체인의 안정성이 위협받고 있다. 본 논문에서는 Round-Robin을 기반으로 하는 알고리즘을 제안함으로써 블록 생성에 대한 공정성을 제공하며 양자 내성 전자 서명인 CRYSTALS-DIlithium을 적용함으로써 근미래에 다가올 양자 위험성에 대비하였다. TPS 측면에서는 DIlithium의 큰 키 크기와 큰 서명 크기에 의해 ECDSA에 비해 낮은 성능을 보여주었지만, Latency 측면에서는 더욱 높은 성능을 보여주며, 이는 실시간성이 중요한 IoT와 같은 분야에서 더욱 높은 효용성을 보여줌을 알 수 있다.

A DEGREE REDUCTION METHOD FOR AN EFFICIENT QUBO FORMULATION FOR THE GRAPH COLORING PROBLEM

  • Hyosang Kang;Hyunwoo Jung;Chaehwan Seol;Namho Hong;Hyunjin Lim;Seokhyun Um
    • The Pure and Applied Mathematics
    • /
    • v.31 no.1
    • /
    • pp.57-81
    • /
    • 2024
  • We introduce a new degree reduction method for homogeneous symmetric polynomials on binary variables that generalizes the conventional degree reduction methods on monomials introduced by Freedman and Ishikawa. We also design an degree reduction algorithm for general polynomials on binary variables, simulated on the graph coloring problem for random graphs, and compared the results with the conventional methods. The simulated results show that our new method produces reduced quadratic polynomials that contains less variables than the reduced quadratic polynomials produced by the conventional methods.

Single Trace Analysis against HyMES by Exploitation of Joint Distributions of Leakages (HyMES에 대한 결합 확률 분포 기반 단일 파형 분석)

  • Park, ByeongGyu;Kim, Suhri;Kim, Hanbit;Jin, Sunghyun;Kim, HeeSeok;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1099-1112
    • /
    • 2018
  • The field of post-quantum cryptography (PQC) is an active area of research as cryptographers look for public-key cryptosystems that can resist quantum adversaries. Among those categories in PQC, code-based cryptosystem provides high security along with efficiency. Recent works on code-based cryptosystems focus on the side-channel resistant implementation since previous works have indicated the possible side-channel vulnerabilities on existing algorithms. In this paper, we recovered the secret key in HyMES(Hybrid McEliece Scheme) using a single power consumption trace. HyMES is a variant of McEliece cryptosystem that provides smaller keys and faster encryption and decryption speed. During the decryption, the algorithm computes the parity-check matrix which is required when computing the syndrome. We analyzed HyMES using the fact that the joint distributions of nonlinear functions used in this process depend on the secret key. To the best of our knowledge, we were the first to propose the side-channel analysis based on joint distributions of leakages on public-key cryptosystem.

Comparative Evaluation of Images after Applying Quantum Denoising System Algorithm to Brain Computed Tomography (뇌 컴퓨터단층검사 시 양자잡음제거 알고리즘을 적용한 영상의 비교평가)

  • Cho, Pyong-Kon
    • Journal of radiological science and technology
    • /
    • v.40 no.4
    • /
    • pp.589-594
    • /
    • 2017
  • The objective of this study was to evaluate the enhancement effects of the quantum denoising system (QDS) on brain CT images. This retrospective study was conducted with 45 adults who visited G Radiology located in Gyungbuk for having brain CT tests between Jul 2017 and Oct 2017 after receiving consents. Subjects were divided into a control group (A group; no QDS(-) application during the brain CT test) and a treatment group (B Group; QDS(+) application during the brain CT test). The following conclusions were obtained from the study. The noise values at the Pons part and the Vermis part were significantly (p<0.05) lower in B Group ($Pons=5.41{\pm}1.05HU$; $Vermis=5.28{\pm}0.73HU$) than A Group ($Pons=6.92{\pm}0.98HU$; Vermis=6.72). The SNR values at the Pons part and the Vermis part were significantly (p<0.05) higher in B Group ($Pons=7.28{\pm}2.56$; $Vermis=8.63{\pm}3.04$) than A Group ($Pons=5.21{\pm}1.28$; $Vermis=6.23{\pm}1.49$). In conclusion, the results of this study suggested that the application of QDS to the brain CT test would enhance the signal to noise ratio (SNR) and the contrast to noise ratio (CNR) to provide an image more appropriate for diagnosis.