• Title/Summary/Keyword: Randomness

Search Result 447, Processing Time 0.027 seconds

True Random Number Generator based on Cellular Automata with Random Transition Rules (무작위 천이규칙을 갖는 셀룰러 오토마타 기반 참난수 발생기)

  • Choi, Jun-Beak;Shin, Kyung-Wook
    • Journal of IKEEE
    • /
    • v.24 no.1
    • /
    • pp.52-58
    • /
    • 2020
  • This paper describes a hardware implementation of a true random number generator (TRNG) for information security applications. A new approach for TRNG design was proposed by adopting random transition rules in cellular automata and applying different transition rules at every time step. The TRNG circuit was implemented on Spartan-6 FPGA device, and its hardware operation generating random data with 100 MHz clock frequency was verified. For the random data of 2×107 bits extracted from the TRNG circuit implemented in FPGA device, the randomness characteristics of the generated random data was evaluated by the NIST SP 800-22 test suite, and all of the fifteen test items were found to meet the criteria. The TRNG in this paper was implemented with 139 slices of Spartan-6 FPGA device, and it offers 600 Mbps of the true random number generation with 100 MHz clock frequency.

Certificateless Non-Interactive Key Exchange Protocol with Forward Secrecy (전방향 안전성을 만족하며 인증서 기반이 아닌 비대화형 키 교환 프로토콜)

  • Lee, Young Kyung;Eom, Ji Eun;Seo, Seung-Hyun;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.531-546
    • /
    • 2015
  • A non-interactive key exchange protocol provides an efficiency of overall system by eliminating additional communication. However, traditional non-interactive key exchange protocols without updating a private key fail to provide forward secrecy, since there is no usage of ephemeral key for randomness of session key. In 2012, Sang et al. proposed a certificateless non-interactive key exchange(CL-NIKE) protocol, but they do not prove the security of the protocol and it does not provide forward secrecy. In this paper, we propose a new CL-NIKE protocol and it's security model. Then we prove the proposed protocol is secure under the security model based on DBDH(Decision Bilinear Diffie-Hellman) assumption. Moreover, we propose a CL-NIKE protocol with forward secrecy which updates user's private key by using multilinear map and prove it's security.

A Smoke Detection Method based on Video for Early Fire-Alarming System (조기 화재 경보 시스템을 위한 비디오 기반 연기 감지 방법)

  • Truong, Tung X.;Kim, Jong-Myon
    • The KIPS Transactions:PartB
    • /
    • v.18B no.4
    • /
    • pp.213-220
    • /
    • 2011
  • This paper proposes an effective, four-stage smoke detection method based on video that provides emergency response in the event of unexpected hazards in early fire-alarming systems. In the first phase, an approximate median method is used to segment moving regions in the present frame of video. In the second phase, a color segmentation of smoke is performed to select candidate smoke regions from these moving regions. In the third phase, a feature extraction algorithm is used to extract five feature parameters of smoke by analyzing characteristics of the candidate smoke regions such as area randomness and motion of smoke. In the fourth phase, extracted five parameters of smoke are used as an input for a K-nearest neighbor (KNN) algorithm to identify whether the candidate smoke regions are smoke or non-smoke. Experimental results indicate that the proposed four-stage smoke detection method outperforms other algorithms in terms of smoke detection, providing a low false alarm rate and high reliability in open and large spaces.

Reliability Based Design Optimization with Variation of Standard Deviation (표준편차의 변동을 고려한 신뢰성 최적설계)

  • Lim, O-Kaung;Kim, Hyung-Wook;Choi, Eun-Ho
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.21 no.5
    • /
    • pp.413-419
    • /
    • 2008
  • Deterministic design optimization (DO) does not explicitly deal with a variety of factors from inherent randomness and uncertainties. Reliability based design optimization(RBDO) is necessary to use in engineering systems in order to guarantee quality and performance of product. In this paper, design variables are considered as random variables. Standard deviation according to change of design variables have changed as much as coefficient of variation. And, if the standard deviation is error of manufacturing, standard deviation-mean relation is concave form. We obtain reliability index using advanced first order second moment method(AFOSM). This paper is examined by solving two examples and the results are compares with DO, RBDO and suggested RBDO.

Fragility Contour Method for the Seismic Performance Assessment of Generic Structures (지진 취약성 등고선을 이용한 내진성능 평가 방법)

  • Jeong, Seong-Hoon;Lee, Ki-Hak;Lee, Do-Hyung
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.15 no.3
    • /
    • pp.65-72
    • /
    • 2011
  • Extensive computer simulations to account for the randomness in the process of seismic demand estimation have been a serious obstacle to the adoption of probabilistic performance assessments for the decision of applying seismic intervention schemes. In this study, a method for rapid fragility assessments based on a response database and the fragility contour method are presented. By the comparison of response contours in different formats, it is shown that representing maximum responses in ductility demand is better for the investigation of the effect of structural parameter changes on seismic demands than representations in absolute values. The presented fragility contour enables designers to practically investigate the probabilistic performance level of every possible retrofit option in a convenient manner using visualized data sets. This example demonstrates the extreme efficiency of the proposed approach in performing fragility assessments and successful application to the seismic retrofit strategies based on limit state probabilities.

Design of SRP based Independent authentication protocol for efficient user authentication (효율적 사용자 인증을 위한 SRP 기반의 독립적 인증 프로토콜 설계)

  • 정경숙;정태충
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.3
    • /
    • pp.130-137
    • /
    • 2003
  • This paper proposes protocol design that can do user authentication efficiently in current systems that client-server environment is developed. And proposes a password-based authentication protocol suitable to certification through trustless network or key exchange. While the existing password-base protocols certify users through certification authority (CA) between client and server, the proposed protocol in this paper, users and server exchange keys and perform authentication without help of CA. To ameliorate the drawback of password-based protocols causing by the short length and randomness of password, the proposed protocol uses the signature techniques of ECDSA and the SRP protocol based on Diffie-Hellman key exchange method. Also, by with compare to round number and Hash function number and exponential operation of existing protocols, we explained efficiency of proposed protocol.

  • PDF

A Hybrid Randomizing Function Based on Elias and Peres Method (일라이어스와 페레즈의 방식에 기반한 하이브리드 무작위화 함수)

  • Pae, Sung-Il;Kim, Min-Su
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.149-158
    • /
    • 2012
  • Proposed is a hybrid randomizing function using two asymptotically optimal randomizing functions: Elias function and Peres function. Randomizing function is an mathematical abstraction of producing a uniform random bits from a source of randomness with bias. It is known that the output rate of Elias function and Peres function approaches to the information-theoretic upper bound. Especially, for each fixed input length, Elias function is optimal. However, its computation is relatively complicated and depends on input lengths. On the contrary, Peres function is defined by a simple recursion. So its computation is much simpler, uniform over the input lengths, and runs on a small footprint. In view of this tradeoff between computational complexity and output efficiency, we propose a hybrid randomizing function that has strengths of the two randomizing functions and analyze it.

Field Distribution Characteristics of a Reverberation Chamber with 2D Diffuser Sets (2D 확산기를 이용한 전자파 잔향실 내의 필드 분포 특성)

  • Yang Wook;Rhee Joong-Geun
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.16 no.4 s.95
    • /
    • pp.373-379
    • /
    • 2005
  • Papers on improvement of electromagnetic field uniformity in a reverberation chamber with 1D Quadratic Residue Diffuser of Schroeder method has been published several times. In this paper, to obtain improved electromagnetic field characteristics and field uniformity in a reverberation chamber, cubical residue diffuser sets of Schroeder type are designed for a chamber in $2.3\;\cal{GHz}\~3\;\cal{GHz}$. The FDTD(Finite-Difference Time-Domain) technique is used to analyze the field characteristics in a chamber. Cubical residue algorithm and 2D arrangement show more randomness than the previous study results. The characteristics of tolerance, polarity, deviations, as well as power efficency, are improved with cubical residue diffuser sets in a chamber.

Marco and Microscopic Observations of Fatigue Crack Growth Behavior in API 2W Gr. 50 Steel Joints (API 2W Gr. 50 강재 용접부의 피로균열전파거동의 거시적 및 미시적 관찰)

  • Sohn, Hye-Jeong;Kim, Seon-Jin
    • Journal of Ocean Engineering and Technology
    • /
    • v.26 no.5
    • /
    • pp.73-80
    • /
    • 2012
  • It is well known that a considerable amount of scatter is shown in experimental results relating to fatigue crack growth even under identical and constant amplitude cyclic loading conditions. Moreover, flux cored arc welding (FCAW) is a common method used to join thick plates such as the structural members of large scale offshore structures and very large container ships. The objective of this study was to investigate the macro- and microscopic observations of the fatigue crack growth (FCG) behavior of the FCAWed API 2W Gr. 50 steel joints typically applied for offshore structures. In order to clearly understand the randomness of the fatigue crack growth behavior in the materials of three different zones, the weld metal (WM), heat affected zone (HAZ), and base metal (BM), experimental fatigue crack growth tests for each of five specimens were performed on ASTM standard compact tension (CT) specimens under constant amplitude cyclic loading. Special focus was placed on the fatigued fracture surfaces. As a result, a different behavior was observed at the macro-level, depending on the type of material property: BM, HAZ, or WM. The variability in the fatigue crack growth rate for WM was higher than that of BM and HAZ.

An Study on the Analysis of Design Criteria for S-Box Based on Deep Learning (딥러닝 기반 S-Box 설계정보 분석 방법 연구)

  • Kim, Dong-hoon;Kim, Seonggyeom;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.337-347
    • /
    • 2020
  • In CRYPTO 2019, Gohr presents that Deep-learning can be used for cryptanalysis. In this paper, we verify whether Deep-learning can identify the structures of S-box. To this end, we conducted two experiments. First, we use DDT and LAT of S-boxes as the learning data, whose structure is one of mainly used S-box structures including Feistel, MISTY, SPN, and multiplicative inverse. Surprisingly, our Deep-learning algorithms can identify not only the structures but also the number of used rounds. The second application verifies the pseudo-randomness of and structures by increasing the nuber of rounds in each structure. Our Deep-learning algorithms outperform the theoretical distinguisher in terms of the number of rounds. In general, the design rationale of ciphers used for high level of confidentiality, such as for military purposes, tends to be concealed in order to interfere cryptanalysis. The methods presented in this paper show that Deep-learning can be utilized as a tool for analyzing such undisclosed design rationale.