• Title/Summary/Keyword: RSA-code

Search Result 23, Processing Time 0.01 seconds

DRM Implementation by Multimedia Fingerprint (멀티미디어 핑거프린트에 의한 DRM 구현)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.3
    • /
    • pp.50-56
    • /
    • 2009
  • Recently, according to the product variety of multimedia content some problems are occurred as like an illegal copying, an illegal distribution and a copyright infringement etc. So, for the solution of these problems, some methods were proposed as like watermarking which inserts the information of copyright to the content and the cipher for authentication to DRM which prevents an illegal copying using RSA. In this paper, the multimedia fingerprint based on BIBD code is inserted to the bit-plane of the image content for DRM with RSA, and while the decoding processing. The experiment is operated with the consideration of the image transmission and the transformation. As a result it confirmed that the multimedia fingerprint code inserted in image is detected 60% upper at AWGN 7dB and detected completely 100% at AWGN 10dB upper on PSNR 30, 40, 70 and 80 of Stirmark attacks.

A Study of PKI-Based E-commerce Security System Design under Java Code Environment (Java Code를 중심으로한 PKI기반 전자상거래 보안시스템 설계)

  • Bang, Kee-Chun;Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.51-57
    • /
    • 2013
  • RSA is the most widely used public key algorithms. Payment via the SSL communications, and user authentication using RSA secure shopping mall that can protect the user's valuable information in the process of building. SSL-based electronic signature technology and encryption protocols for this technology are electronic documents are delivered to the other party through a separate encryption process, the information sender to enter information on a web browser (user) and the recipient (the Web server of the site Manager), except you will not be able to decrypt the contents. Therefore, the information is encrypted during the transfer of electronic documents even if hackers trying to Sniffing because its contents can never understand. Of internet shopping mall in the user authentication 'and' Communications' SSL secure shopping mall built with the goal of the methodology are presented.

Design of Efficient Hacking Prevention Systems Using a Smart Card (스마트카드 기반의 효율적인 해킹 방지 시스템 설계)

  • 황선태;박종선
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.2
    • /
    • pp.179-190
    • /
    • 2004
  • This paper describes the design of hacking prevention systems using a smart card. It consists of two parts, i.e., PC authentication and Keyboard-buffer hacking prevention. PC authentication function is a procedure to handle the access control to the target PC. The card's serial number is used for PIN(Personal Identification Number) and is converted into hash-code by SHA-1 hash-function to verify the valid users. The Keyboard-buffer hacking prevention function converts the scan codes into the encoded forms using RSA algorithm on the Java Card, and puts them into the keyboard-buffer to protect from illegal hacking. The encoded information in the buffer is again decoded by the RSA algorithm and displayed on the screen. in this paper, we use RSA_PKCS#1 algorithm for encoding and decoding. The reason using RSA technique instead of DES or Triple-DES is for the expansion to multi-functions in the future on PKI. Moreover, in the ubiquitous computing environment, this smart card security system can be used to protect the private information from the illegal attack in any computing device anywhere. Therefore, our security system can protect PC user's information more efficiently and guarantee a legal PC access authority against any illegal attack in a very convenient way.

  • PDF

Design of a Lightweight Security Protocol Using Post Quantum Cryptography (양자내성암호를 활용한 경량 보안 프로토콜 설계)

  • Jang, Kyung Bae;Sim, Min Joo;Seo, Hwa Jeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.8
    • /
    • pp.165-170
    • /
    • 2020
  • As the IoT (Internet of Things) era is activated, a lot of information including personal information is being transmitted through IoT devices. For information protection, it is important to perform cryptography communication, and it is required to use a lightweight security protocol due to performance limitations. Currently, most of the encryption methods used in the security protocol use RSA and ECC (Elliptic Curve Cryptography). However, if a high performance quantum computer is developed and the Shor algorithm is used, it can no longer be used because it can easily solve the stability problems based on the previous RSA and ECC. Therefore, in this paper, we designed a security protocol that is resistant to the computational power of quantum computers. The code-based crypto ROLLO, which is undergoing the NIST (National Institute of Standards and Technology) post quantum cryptography standardization, was used, and a hash and XOR computation with low computational consumption were used for mutual communication between IoT devices. Finally, a comparative analysis and safety analysis of the proposed protocol and the existing protocol were performed.

State of Practice of Performance-Based Seismic Design in Indonesia

  • Sukamta, Davy;Alexander, Nick
    • International Journal of High-Rise Buildings
    • /
    • v.1 no.3
    • /
    • pp.211-220
    • /
    • 2012
  • The current 2002 Indonesian Seismic Code consists of prescriptive criteria that are intended to result in buildings capable of providing certain levels of performance. However, the actual performance capability of buildings is not assessed as part of the code procedures. Several analysis procedures are allowed, and the state of practice is to use the RSA with six-zone seismic map developed for 475-year earthquake. This code is being revised and will adopt many of the ASCE7-10 provisions and 2475-year earthquake for MCE. The growth of tall buildings compels engineers to look for more optimal lateral system. The use of RC core wall as single system has been adopted by very few engineering firms, which is allowed in the current code but will no longer be the case if the new one is in effect. Other innovative structural system such as core wall and outrigger is not addressed in the proposed new code. Engineers must then resort to NLRHA. Currently, one 50-story building under construction using RC core wall and outrigger has been designed with RSA and employing capacity design principles, then evaluated using NLRHA per TBI Guidelines. Based on the evaluation, the performance of the 50-story building generally still meets the criteria of the TBI Guidelines. The result of the case study is presented in this paper.

Design and FPGA Implementation of a High-Speed RSA Algorithm for Digital Signature (디지털 서명을 위한 고속 RSA 암호 시스템의 설계 및 FPGA 구현)

  • 강민섭;김동욱
    • The KIPS Transactions:PartC
    • /
    • v.8C no.1
    • /
    • pp.32-40
    • /
    • 2001
  • In this paper, we propose a high-speed modular multiplication algorithm which revises conventional Montgomery's algorithm. A hardware architecture is also presented to implement 1024-bit RSA cryptosystem for digital signature based on the proposed algorithm. Each iteration in our approach requires only one addition operation for two n-bit integers, while that in Montgomery's requires two addition operations for three n-bit integers. The system which is modelled in VHDL(VHSIC Hardware Description Language) is simulated in functionally through the use of $Synopsys^{TM}$ tools on a Axil-320 workstation, where Altera 10K libraries are used for logic synthesis. For FPGA implementation, timing simulation is also performed through the use of Altera MAX + PLUS II. Experimental results show that the proposed RSA cryptosystem has distinctive features that not only computation speed is faster but also hardware area is drastically reduced compared to conventional approach.

  • PDF

Performance Comparison of the CELM Encryption Algorithm (CELM 암호화 알고리즘의 성능 비교)

  • 박혜련;이종혁
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.3
    • /
    • pp.481-486
    • /
    • 2002
  • In this paper, we propose CELM(Cascade ELM) to improve stability. We could realize as cascade connected each other key value with N degree equation which has a initial value. And we could know to be improved in stability with the nature of Chaos in simulation result. In efficiency, this CELM algorithm identified sire of encrypted code with size of source code and we could know more efficient than existing RSA and ECC. In speed, CELM took average 0.18㎳ degree to encrypt a file. Although it was slower than DES, it was faster than ECC of RSA.

Seismic Access of Offshore Subsea Manifold using RSA and THA Seismic Analysis Results for Simplified Model (단순화 모델에서의 응답스펙트럼과 시간이력 내진해석 결과를 활용한 해양플랜트용 매니폴드 실제품의 내진강도 평가)

  • Lee, Eun-Ho;Kwak, Si-Young
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.32 no.1
    • /
    • pp.7-16
    • /
    • 2019
  • In this paper, for a seismic analysis of an offshore subsea manifold, Response Spectrum Analysis(RSA) and Time History Analysis(THA) were conducted under a various analysis conditions. Response spectrum and seismic design procedure have followed ISO19901-2 code. In case of THA, The response spectrum were converted into artificial earthquake history and both of Explicit and Implicit solvers were used to examine the characteristics of seismic analysis. For the verification, Various seismic analysis methods were applied on a single degree of freedom beam model and a simplified model of the actual manifold. The difference between the results of RSA and THA on the simplified manyfold model evaluated for the analysis of the actual manifold. Because THA is impossible in case of real complex structure such as a manifold, Safety of the actual manifold structure was accessed by using the RSA and the difference between the results of RSA and THA from the simplified model.

Scaling Method of Earthquake Records for the Seismic Analysis of Tall Buildings (초고층 구조물의 지진해석을 위한 지진기록의 조정방법)

  • Kim, Tae-Ho;Park, Ji-Hyeong;Kim, Ook-Jong;Lee, Do-Bum;Ko, Hyun
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.12 no.5
    • /
    • pp.11-21
    • /
    • 2008
  • In recent years, time history analysis has been the method generally used for the seismic analysis of tall buildings with damping devices. When T is the natural period of the first vibration mode of the structure, the sum of the spectral acceleration of the earthquake ground motion is usually adjusted to that of the design response spectrum in the period ranging from 0.2T to 1.5T to meet the requirements of design code. However, when the ground motion is scaled according to the design code, the differences in the responses obtained by response spectrum analysis (RSA) and time history analysis (THA) of the structures increase as the natural period of the structure becomes longer. When time history analysis is performed by using ground accelerations that are scaled according to the design code, base shear is similar to that obtained from RSA, but other responses, such as displacements, drifts and member forces, are underestimated compared to RSA. If these results are adjusted by multiplying with the scale-up factor, the scaled responses become much smaller. Therefore, a scaling method of ground motions corresponding with the design code is proposed in this study, as a way of assisting structural engineers in generating artificial ground motions.

Torsional effects in symmetrical steel buckling restrained braced frames: evaluation of seismic design provisions

  • Roy, Jonathan;Tremblay, Robert;Leger, Pierre
    • Earthquakes and Structures
    • /
    • v.8 no.2
    • /
    • pp.423-442
    • /
    • 2015
  • The effects of accidental eccentricity on the seismic response of four-storey steel buildings laterally stabilized by buckling restrained braced frames are studied. The structures have a square, symmetrical footprint, without inherent eccentricity between the center of lateral resistance (CR) and the center of mass (CM). The position of the bracing bents in the buildings was varied to obtain three different levels of torsional sensitivity: low, intermediate and high. The structures were designed in accordance with the seismic design provisions of the 2010 National Building Code of Canada (NBCC). Three different analysis methods were used to account for accidental eccentricity in design: (1) Equivalent Static Procedure with static in-plane torsional moments assuming a mass eccentricity of 10% of the building dimension (ESP); (2) Response Spectrum Analysis with static torsional moments based on 10% of the building dimension (RSA-10); and (3) Response Spectrum Analysis with the CM being displaced by 5% of the building dimension (RSA-5). Time history analyses were performed under a set of eleven two-component historical records. The analyses showed that the ESP and RSA-10 methods can give appropriate results for all three levels of torsional sensitivity. When using the RSA-5 method, adequate performance was also achieved for the low and intermediate torsional sensitivity cases, but the method led to excessive displacements (5-10% storey drifts), near collapse state, for the highly torsionally sensitive structures. These results support the current provisions of NBCC 2010.