• 제목/요약/키워드: Randomness

Search Result 451, Processing Time 0.029 seconds

Split Password-Based Authenticated Key Exchange (분할된 패스워드 기반 인증된 키교환 프로토콜)

  • 류종호;염흥열
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.23-36
    • /
    • 2004
  • This paper presents a password based authentication and key exchange protocol which can be used for both authenticating users and exchanging session keys for a subsequent secure communication over an untrusted network. Our idea is to increase a randomness of the password verification data, i.e., we split the password, and then amplify the split passwords in the high entropy-structured password verification data. And in order to prevent the verifier-compromised attack, we construct our system such that the password verification data is encrypted with the verifier's key and the private key of verifier used to encrypt it is stored in a secure place like a smart cards. Also we propose the distributed password authentication scheme utilizing many authentication servers in order to prevent the server-compromised attack occurred when only one server is used. Furthermore, the security analysis on the proposed protocol has been presented as a conclusion.

Fabrication of Low-Cost Physically Unclonable Function (PUF) Chip Using Multiple Process Variables (다중 공정변수를 활용한 저비용 PUF 보안 Chip의 제작)

  • Hong-Seock Jee;Dol Sohn;Ju-Won Yeon;Tae-Hyun Kil;Hyo-Jun Park;Eui-Cheol Yun;Moon-Kwon Lee;Jun-Young Park
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.37 no.5
    • /
    • pp.527-532
    • /
    • 2024
  • Physically Unclonable Functions (PUFs) provide a high level of security for private keys using unique physical characteristics of hardware. However, fabricating PUF chips requires numerous semiconductor processes, leading to high costs, which limits their applications. In this work, we introduce a low-cost manufacturing method for PUF security chips. First, surface roughening through wet-etching is utilized to create random variables. Additionally, physical vapor deposition is added to further enhance randomness. After PUF chip fabrication, both Hamming distance (HD) and Hamming weight (HW) are extracted and compared to verify the fabricated chip. It is confirmed that the PUF chip using two different multiple process variables demonstrates superior uniqueness and uniformity compared to the PUF security chip fabricated using only a single process variable.

Dual-mode Pseudorandom Number Generator Extension for Embedded System (임베디드 시스템에 적합한 듀얼 모드 의사 난수 생성 확장 모듈의 설계)

  • Lee, Suk-Han;Hur, Won;Lee, Yong-Surk
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.8
    • /
    • pp.95-101
    • /
    • 2009
  • Random numbers are used in many sorts of applications. Some applications, like simple software simulation tests, communication protocol verifications, cryptography verification and so forth, need various levels of randomness with various process speeds. In this paper, we propose a fast pseudorandom generator module for embedded systems. The generator module is implemented in hardware which can run in two modes, one of which can generate random numbers with higher randomness but which requires six cycles, the other providing its result within one cycle but with less randomness. An ASIP (Application Specific Instruction set Processor) was designed to implement the proposed pseudorandom generator instruction sets. We designed a processor based on the MIPS architecture,, by using LISA, and have run statistical tests passing the sequence of the Diehard test suite. The HDL models of the processor were generated using CoWare's Processor Designer and synthesized into the Dong-bu 0.18um CMOS cell library using the Synopsys Design Compiler. With the proposed pseudorandom generator module, random number generation performance was 239% faster than software model, but the area increased only 2.0% of the proposed ASIP.

Pairwise Key Agreement Protocols Using Randomness Re-use Technique (난수 재사용 기법을 이용한 다중 키 교환 프로토콜)

  • Jeong, Ik-Rae;Lee, Dong-Hoon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.949-958
    • /
    • 2005
  • In the paper we study key agreement schemes when a party needs to establish a session key with each of several parties, thus having multiple session keys. This situation can be represented by a graph, tailed a key graph, where a vertex represents a party and an edge represents a relation between two parties sharing a session key. graphs to establish all session keys corresponding to all edges in a key graph simultaneously in a single session. A key agreement protocol of a key graph is a natural extension of a two-party key agreement protocol. We propose a new key exchange model for key graphs which is an extension of a two-party key exchange model. using the so-called randomness re-use technique which re-uses random values to make session keys for different sessions, we suggest two efficient key agreement protocols for key graphs based on the decisional Diffie-Hellman assumption, and prove their securities in the key exchange model of key graphs. Our first scheme requires only a single round and provides key independence. Our second scheme requires two rounds and provides forward secrecy. Both are proven secure In the standard model. The suggested protocols are the first pairwise key agreement protocols and more efficient than a simple scheme which uses a two-party key exchange for each necessary key. Suppose that a user makes a session key with n other users, respectively. The simple scheme's computational cost and the length of the transmitted messages are increased by a factor of n. The suggested protocols's computational cost also depends on n, but the length of the transmitted messages are constant.

BDS Statistic: Applications to Hydrologic Data (BDS 통계: 수문자료에의 응용)

  • Kim, Hyeong-Su;Gang, Du-Seon;Kim, Jong-U;Kim, Jung-Hun
    • Journal of Korea Water Resources Association
    • /
    • v.31 no.6
    • /
    • pp.769-777
    • /
    • 1998
  • In this study, various time series are analyzed to check nonlinearities of the data. The nonlinearity of a system can be investigated by testing the randomness of the time series data. To test the randomness, four nonparametric test statistics and a new test statistic, called the BDS statistic are used and the results and the results are compared. The Brock, Dechert, and Scheinkman (BDS) statistic is originated from the statistical properties of the correlation integral which is used for searching for chaos and has been shown very effective in distinguishing nonlinear structures in dynamic systems from random structures. As a result of application to linear and nonlinear models which are well known, the BDS statistic is found to be more effective than nonparametric test statistics in identifying nonlinear structure in the time series. Hydrologic time series data are fitted to ARMA type models and the statistics are applied to the residuals. The results show that the BDS statistic can distinguish chaotic nonlinearity from randomness and that the BDS statistic can also be used for verifying the validity of the fitted model.

  • PDF

A Hydrometeorological Time Series Analysis of Geum River Watershed with GIS Data Considering Climate Change (기후변화를 고려한 GIS 자료 기반의 금강유역 수문기상시계열 특성 분석)

  • Park, Jin-Hyeog;Lee, Geun-Sang;Yang, Jeong-Seok;Kim, Sea-Won
    • Spatial Information Research
    • /
    • v.20 no.3
    • /
    • pp.39-50
    • /
    • 2012
  • The objective of this study is the quantitative analysis of climate change effects by performing several statistical analyses with hydrometeorological data sets for past 30 years in Geum river watershed. Temperature, precipitation, relative humidity data sets were collected from eight observation stations for 37 years(1973~2009) in Geum river watershed. River level data was collected from Gongju and Gyuam gauge stations for 36 years(1973~2008) considering rating curve credibility problems and future long-term runoff modeling. Annual and seasonal year-to-year variation of hydrometeorological components were analyzed by calculating the average, standard deviation, skewness, and coefficient of variation. The results show precipitation has the strongest variability. Run test, Turning point test, and Anderson Exact test were performed to check if there is randomness in the data sets. Temperature and precipitation data have randomness and relative humidity and river level data have regularity. Groundwater level data has both aspects(randomness and regularity). Linear regression and Mann-Kendal test were performed for trend test. Temperature is increasing yearly and seasonally and precipitation is increasing in summer. Relative humidity is obviously decreasing. The results of this study can be used for the evaluation of the effects of climate change on water resources and the establishment of future water resources management technique development plan.

Security Analysis of KS X 4600-1 / ISO IEC 12139-1 (원격 검첨용 PLC 기술(KS X 4600-1 / ISO IEC 12139-1) 보안성 분석)

  • Hong, Jeong-Dae;Cheon, Jung-Hee;Ju, Seong-Ho;Choi, Moon-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.65-75
    • /
    • 2011
  • Power Line Communication (PLC) is a system for carrying data on a conductor used for electric power transmission. Recently, PLC has received much attention due to connection efficiency and possibility of extension. It can be used for not only alternative communication, in which communication line is not sufficient, but also for communication between home appliances. Korea Electronic Power Cooperation (KEPCO) is constructing the system, which automatically collects values of power consumption of every household. Due to the randomness and complicated physical characteristics of PLC protocol (KS X4600-1), it has been believed that the current PLC is secure in the sense that it is hard that an attacker guesses or modifies the value of power consumption. However, we show that the randomness of the protocol is closely related to state of the communication line and thus anyone can easily guess the randomness by checking the state of the communication line. In order to analyze the security of PLC, we study the protocol in detail and show some vulnerability. In addition, we suggest that PLC needs more secure protocol on higher layers. We expect that the study of PLC help in designing more secure protocol as well.

Uncertainty Analysis of the Risk of Hydraulic Structures Using Generalized Logistic Distribution (Generalized Logistic 분포형을 이용한 수공구조물의 위험도에 대한 불확실성 해석)

  • Shin, Hong-Joon;Heo, Jun-Haeng
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2006.05a
    • /
    • pp.758-763
    • /
    • 2006
  • Statistical concepts and methods are routinely utilized in a number of design and management problems in engineering hydrology. This is because most of hydrological processes have some degree of randomness and uncertainty. Thus, the concepts of risk and uncertainty are commonly utilized for designing and evaluating hydraulic structures such as spillways and dikes. Therefore, in this study, uncertainty analysis considering the variance of design floods is performed to evaluate the uncertainty of the hydrologic risk of flood related hydraulic structures using frequency analysis.

  • PDF

A NEW VERSION OF FIRST RETURN TIME TEST OF PSEUDORANDOMNESS

  • Kim, Dong-Han
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.12 no.2
    • /
    • pp.109-118
    • /
    • 2008
  • We present a new version of the first return time test for pseudorandomness. Let $R_n$ be the first return time of initial n-block with overlapping. An algorithm to calculate the probability distribution of the first return time $R_n$ for each starting block is presented and used to test pseudorandom number generators. The standard Z-test for log $R_n$ is applied to test the pseudorandom number generators.

  • PDF